A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).
☆163Mar 2, 2022Updated 4 years ago
Alternatives and similar repositories for proxylogscan
Users that are interested in proxylogscan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- A tool to find redirection chains in multiple URLs☆78Jan 1, 2025Updated last year
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Apr 30, 2023Updated 2 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆14Sep 23, 2022Updated 3 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆251Mar 31, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- huntr.dev public disclosures/hacktivity watcher☆17Nov 5, 2023Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆297Jul 2, 2024Updated last year
- 以子域名作为基础数据进行分析出关键词,然后基于FoFa、Shodan、Zoomye网络引擎的多维度资产探测脚本☆21Apr 25, 2021Updated 5 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- ☆385Aug 19, 2021Updated 4 years ago
- nuclei scanner for proxyshell ( CVE-2021-34473 )☆47Oct 9, 2022Updated 3 years ago
- NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.☆78Nov 5, 2022Updated 3 years ago
- ☆16Nov 19, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A fast GitHub stargazers information gathering tool☆72Mar 2, 2022Updated 4 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Dump all available paths and/or endpoints on WADL file.☆98Nov 24, 2025Updated 5 months ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- CloudFlare Checker written in Go☆237May 12, 2024Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆15Jul 1, 2020Updated 5 years ago
- A tool for append URLs, skipping duplicates/paths & combine parameters.☆128Mar 2, 2022Updated 4 years ago
- Host Header Injection Checker☆84Mar 2, 2022Updated 4 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆327Mar 9, 2022Updated 4 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Mar 2, 2022Updated 4 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- Windows活动目录中的LDAP信息收集工具☆235Oct 9, 2021Updated 4 years ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30May 6, 2020Updated 5 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Dec 9, 2022Updated 3 years ago
- IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)☆52Sep 19, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆702Oct 29, 2021Updated 4 years ago
- [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains.…☆177Oct 21, 2022Updated 3 years ago
- ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)☆185Oct 19, 2021Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆32May 1, 2021Updated 4 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆395Nov 5, 2020Updated 5 years ago
- Goal Go Red-Team 工具类☆45Jan 15, 2025Updated last year