gottburgm / Exploits
Containing Self Made Perl Reproducers / PoC Codes
☆193Updated 5 years ago
Alternatives and similar repositories for Exploits:
Users that are interested in Exploits are comparing it to the libraries listed below
- Search Exploitable Software on Linux☆227Updated 2 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- A mini webserver with FTP support for XXE payloads☆330Updated last year
- Collection of different exploits☆182Updated 4 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆231Updated 5 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆532Updated 4 years ago
- Only Hitting PoC [Tested on Windows Server 2008 r2]☆128Updated 5 years ago
- Pip install exploit package☆158Updated 6 years ago
- this contain the burp pack☆206Updated 8 years ago
- POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.☆111Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆426Updated last year
- Reverse Shell Cheat Sheet TooL☆294Updated 4 years ago
- CVE-2017-9506 - SSRF☆188Updated 3 years ago
- Local File Inclusion Exploitation Tool (mirror)☆125Updated 8 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆254Updated 10 months ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- Rock-On is a all in one Recon tool that will just get a single entry of the Domain name and do all of the work alone.☆297Updated 5 years ago
- HTTP file upload scanner for Burp Proxy☆488Updated last year
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆279Updated 9 years ago
- SHELLING - a comprehensive OS command injection payload generator☆108Updated 5 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 6 months ago
- The Hacker Playbook 3 - Web Commands☆83Updated 6 years ago
- Bypassing-Web-Application-Firewalls-And-XSS-Filters A series of python scripts for generating weird character combinations and lists for…☆146Updated 4 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆275Updated 6 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆261Updated 7 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆332Updated 3 years ago
- Linux post exploitation enumeration and exploit checking tools☆179Updated 5 years ago
- davtest (improved)- Exploits WebDAV folders☆112Updated 2 years ago