hlldz / wildPwn
Brute forcer and shell deployer for WildFly
☆100Updated 6 years ago
Alternatives and similar repositories for wildPwn:
Users that are interested in wildPwn are comparing it to the libraries listed below
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆57Updated 4 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Deploy payloads to *Nix systems en masse☆105Updated 4 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆103Updated 6 years ago
- An interactive OOB XXE data exfiltration tool☆91Updated 7 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆126Updated 2 years ago
- A WebDAV PROPFIND C2 tool☆118Updated 5 years ago
- WhiteBox CMS analysis☆69Updated last year
- Used for the osce exam preparation☆74Updated 8 years ago
- Joomla Vulnerability Component Scanner☆60Updated 6 years ago
- Some scripts and exploits☆143Updated 6 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- Verification tools for CVE-2016-1287☆33Updated 7 years ago
- Burp Suite Attack Selector Plugin☆62Updated 7 years ago
- DNS2Proxy offensive proxy version for HSTS☆29Updated 7 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆42Updated 6 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆70Updated 4 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆136Updated 3 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆80Updated 6 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 7 years ago
- Metasploit msfvenom Bash Completions Generator☆41Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago