Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layers verification.
☆46Jul 13, 2018Updated 7 years ago
Alternatives and similar repositories for dot2moon
Users that are interested in dot2moon are comparing it to the libraries listed below
Sorting:
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆272Mar 24, 2021Updated 4 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Search for Directory Traversal Vulnerabilities☆459Jan 11, 2026Updated last month
- Analyze Android APK files from a browser.☆15Sep 29, 2020Updated 5 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆265Nov 18, 2021Updated 4 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 7 months ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- My attempts at making life with VMware that little bit easier.☆11Aug 7, 2023Updated 2 years ago
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- Monitor the textual data pasted into Windows clipboard☆29Nov 4, 2018Updated 7 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Automation: Bash script wrapper to find and verify time base sql injection☆10Aug 25, 2022Updated 3 years ago
- ☆13Sep 8, 2024Updated last year
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- Presentation presented at DEFCON 27 PHV☆27Aug 14, 2019Updated 6 years ago
- Bash script to automate Bug Bounty Reconnaissance☆45Jan 3, 2021Updated 5 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Aug 18, 2021Updated 4 years ago
- ☆13Jul 27, 2020Updated 5 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- 010 template for apfs☆26Feb 26, 2021Updated 5 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆110Oct 28, 2025Updated 4 months ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Aug 19, 2020Updated 5 years ago
- Check url is live (*HTTP status code "200 ok" only*).☆15Jun 13, 2020Updated 5 years ago
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- ActiveMime File Format Documentation☆19Jun 28, 2021Updated 4 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Aug 27, 2019Updated 6 years ago
- 💾 Bash oneliners and terminal tricks☆22Nov 24, 2022Updated 3 years ago
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- Converts Half-WPA handshake to hashcat☆19Oct 29, 2018Updated 7 years ago
- Backdoor for Windows systems (client and server) writen in C (client) and ASM (server) using reverse connection☆19Jul 6, 2014Updated 11 years ago