bash poc scripts to exploit open fpm ports
☆59Jul 31, 2019Updated 6 years ago
Alternatives and similar repositories for fpmvuln
Users that are interested in fpmvuln are comparing it to the libraries listed below
Sorting:
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Dec 21, 2020Updated 5 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆35Jan 8, 2021Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22May 13, 2023Updated 2 years ago
- A tool for sorting blocks of lines☆36Oct 4, 2022Updated 3 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Jul 18, 2024Updated last year
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- CVE-2019-12384 漏洞测试环境☆21Nov 16, 2022Updated 3 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13May 27, 2023Updated 2 years ago
- Hash-Ensured Replicated Database☆16Sep 27, 2019Updated 6 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆10Jun 26, 2024Updated last year
- ☆11Mar 19, 2019Updated 6 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Oneliners curated from my experience and from the internet☆23Feb 8, 2021Updated 5 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Aug 19, 2020Updated 5 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- ViewState Payload Generator☆26Aug 17, 2018Updated 7 years ago
- Work In progress to capture all sorts of data transaction on any Platform supported by Frida.☆11Feb 13, 2026Updated 3 weeks ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆15Oct 16, 2024Updated last year
- ☆12Sep 23, 2023Updated 2 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- ☆11Jul 28, 2020Updated 5 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- 10 Reset Password Flaws Based on Web Application Security☆11Oct 19, 2020Updated 5 years ago