gottburgm / Exploits
Containing Self Made Perl Reproducers / PoC Codes
☆194Updated 4 years ago
Alternatives and similar repositories for Exploits:
Users that are interested in Exploits are comparing it to the libraries listed below
- Search Exploitable Software on Linux☆227Updated last year
- A mini webserver with FTP support for XXE payloads☆329Updated last year
- kadimus is a tool to check and exploit lfi vulnerability.☆530Updated 4 years ago
- POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.☆111Updated 2 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 5 months ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆290Updated last year
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆229Updated 5 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆202Updated last year
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆273Updated 6 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆261Updated 7 years ago
- Utils☆267Updated 9 years ago
- Reverse Shell Cheat Sheet TooL☆294Updated 4 years ago
- ☆264Updated 6 years ago
- Local File Inclusion Exploitation Tool (mirror)☆124Updated 8 years ago
- The Hacker Playbook 3 - Web Commands☆82Updated 6 years ago
- Another way to bypass WAF Cheat Sheet (draft)☆421Updated 6 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.☆312Updated 3 years ago
- SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.☆459Updated 7 years ago
- HTTP file upload scanner for Burp Proxy☆490Updated last year
- XSS Fuzzer is a tool which generates XSS payloads based on user-defined vectors and fuzzing lists.☆140Updated 6 years ago
- CVE-2017-9506 - SSRF☆188Updated 3 years ago
- An Exploit framework for Web Vulnerabilities written in Python☆170Updated 4 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆275Updated 9 years ago
- A collection of curated Java Deserialization Exploits☆593Updated 3 years ago
- Pip install exploit package☆158Updated 6 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆363Updated 5 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆425Updated last year
- Bypassing-Web-Application-Firewalls-And-XSS-Filters A series of python scripts for generating weird character combinations and lists for…☆145Updated 4 years ago
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!☆294Updated 5 years ago