enkaskal / aws-waf-sqli-bypass-PoC
Bypassing AWS WAF using a single ';'
☆40Updated 6 years ago
Alternatives and similar repositories for aws-waf-sqli-bypass-PoC:
Users that are interested in aws-waf-sqli-bypass-PoC are comparing it to the libraries listed below
- Data exfiltration using DNS☆21Updated 5 years ago
- Automated privilege escalation of the world's most popular Docker images.☆64Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Install and upgrade projectdiscovery tools☆10Updated 2 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 9 months ago
- Backend for Nuclear Pond☆21Updated last year
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- multiple password 'asher using Python’s hashlib☆14Updated 3 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆39Updated 4 months ago
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆27Updated 6 months ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 2 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆14Updated 7 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 3 years ago
- Security checks for your researches☆33Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 2 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆24Updated 2 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 9 months ago
- Validate proxies for specific domain☆35Updated 3 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- Related subdomains finder☆29Updated 2 years ago
- Collection of scripts used to convert stuff from one penetration testing collaborative platform to another and facilitate the migration o…☆13Updated last year
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago