hlldz / wildPwnLinks
Brute forcer and shell deployer for WildFly
☆99Updated 7 years ago
Alternatives and similar repositories for wildPwn
Users that are interested in wildPwn are comparing it to the libraries listed below
Sorting:
- Burp Suite Attack Selector Plugin☆60Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- An interactive OOB XXE data exfiltration tool☆90Updated 8 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆103Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆126Updated 2 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- Metasploit msfvenom Bash Completions Generator☆42Updated 8 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Burp Suite Extensions☆127Updated 11 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 3 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- ☆42Updated 5 years ago
- Java serialization brute force attack tool.☆123Updated 7 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Advanced XPath Injection Tool☆34Updated 10 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 11 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆66Updated 3 months ago
- A tool for recovering server credentials from a pgadmin4 database☆20Updated 3 years ago