gottburgm / ExploitsLinks
Containing Self Made Perl Reproducers / PoC Codes
☆194Updated 5 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- Search Exploitable Software on Linux☆228Updated 2 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- A mini webserver with FTP support for XXE payloads☆331Updated last year
- POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.☆112Updated 2 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆255Updated 2 weeks ago
- Reverse Shell Cheat Sheet TooL☆296Updated 5 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆363Updated 5 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆232Updated 5 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆291Updated 2 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆428Updated last year
- Utils☆267Updated 9 years ago
- Another way to bypass WAF Cheat Sheet (draft)☆424Updated 6 years ago
- Pip install exploit package☆158Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆593Updated 4 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆536Updated 4 years ago
- Linux post exploitation enumeration and exploit checking tools☆180Updated 5 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 7 months ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆279Updated 9 years ago
- CVE-2017-9506 - SSRF☆188Updated 3 years ago
- SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.☆462Updated 7 years ago
- SHELLING - a comprehensive OS command injection payload generator☆110Updated 5 years ago
- The Hacker Playbook 3 - Web Commands☆83Updated 7 years ago
- Content hijacking proof-of-concept using Flash, PDF and Silverlight☆384Updated 6 years ago
- A lab for playing with NoSQL Injection☆131Updated 4 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆202Updated 3 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- HTTP.ninja☆151Updated last year
- Windows Pentest Scripts☆231Updated 7 years ago