eversinc33 / urlExtractLinks
Recursively extract urls from a web page for reconnaissance.
☆12Updated last year
Alternatives and similar repositories for urlExtract
Users that are interested in urlExtract are comparing it to the libraries listed below
Sorting:
- ☆14Updated 4 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Updated 3 years ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Updated 4 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14Updated 4 years ago
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆24Updated 4 years ago
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Updated 3 years ago
- CVE-2022-30780 - lighttpd remote denial of service☆17Updated last year
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- Computer Network Exploitation (CNE) Field Manual☆14Updated last year
- Windows 权限提升 BadPotato☆14Updated 4 years ago
- CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.☆40Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 3 years ago
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆33Updated last year
- Run shellcode through InnoSetup code engine.☆70Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆14Updated 3 years ago
- ☆18Updated 3 years ago
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆32Updated 3 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆18Updated 3 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆81Updated 3 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆74Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆23Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆67Updated 2 years ago
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆11Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- ☆11Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Sources Codes of many MSIL malwares☆24Updated 3 years ago
- Memory Scaner☆64Updated 3 years ago