ferdouszihad / tour-mamaLinks
☆16Updated 6 months ago
Alternatives and similar repositories for tour-mama
Users that are interested in tour-mama are comparing it to the libraries listed below
Sorting:
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Updated last year
- ☆13Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Updated 2 years ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Powershell Scripts for Blue Team members☆11Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Updated 8 months ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Updated 11 months ago
- Subdomains scanner Spider☆13Updated last year
- SSH & FTP brute-forcing tool written in python☆11Updated last year
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆16Updated last month
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆17Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆20Updated last year
- Find subdomains by searching public certificate records☆16Updated last year
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆20Updated 5 years ago
- ☆23Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆27Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago