francisck / shellshock-cgi
A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific server
☆12Updated 9 years ago
Alternatives and similar repositories for shellshock-cgi:
Users that are interested in shellshock-cgi are comparing it to the libraries listed below
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 7 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆17Updated 5 years ago
- ☆26Updated 7 years ago
- ☆52Updated 4 years ago
- ☆20Updated 9 years ago
- ☆26Updated 8 years ago
- ☆93Updated 7 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆165Updated 7 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Some of the scripts I use.☆41Updated 7 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- …(⊙_⊙;)…☆56Updated 4 years ago
- ☆51Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆102Updated last year
- Learnings from OSCP and other random stuff.☆31Updated last year
- Penetration testing scripts☆141Updated 6 years ago
- ☆120Updated 8 years ago
- A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters☆250Updated 2 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆12Updated 9 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆111Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆79Updated 9 months ago