foreseon / SubrusterLinks
Fast, compact and all-around subdomain enumeration tool written in Rust
☆23Updated 3 years ago
Alternatives and similar repositories for Subruster
Users that are interested in Subruster are comparing it to the libraries listed below
Sorting:
- a deterministic finite automata ranker☆71Updated 3 years ago
- ☆38Updated 2 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆55Updated last year
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- an Evil Java RMI Registry.☆52Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- ☆14Updated 3 months ago
- Default plugins for Jaeles Scanner☆35Updated 4 years ago
- PoC repository for CVE-2023-29007☆34Updated 2 years ago
- ☆31Updated last year
- ☆17Updated 2 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- Vulnerable Target (VT) is a specialized tool designed for security professionals, researchers, and educators that creates intentionally v…☆22Updated this week
- ☆36Updated 8 months ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆64Updated 9 months ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆18Updated 2 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- ☆20Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆13Updated last year
- A fingerprint generation helper for nuclei network templates☆74Updated 2 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- A tool for creating proxy dll for hijacking☆42Updated 10 months ago