hlldz / wildPwnLinks
Brute forcer and shell deployer for WildFly
☆101Updated 7 years ago
Alternatives and similar repositories for wildPwn
Users that are interested in wildPwn are comparing it to the libraries listed below
Sorting:
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Some scripts and exploits☆147Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆107Updated 5 years ago
- Burp Suite Attack Selector Plugin☆60Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆124Updated 6 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 2 years ago
- ☆29Updated 7 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Updated 5 years ago
- Metasploit msfvenom Bash Completions Generator☆43Updated 9 years ago
- Joomla Vulnerability Component Scanner☆61Updated 7 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Various tools for managing bug bounty recon and exploration.☆48Updated 2 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆80Updated 8 years ago
- ☆93Updated 2 years ago
- ☆63Updated 7 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Updated 4 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆81Updated 2 years ago
- Using IPv6 to Bypass Security☆93Updated 3 weeks ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated last year
- DNS2Proxy offensive proxy version for HSTS☆29Updated 7 years ago
- ☆56Updated 2 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Updated 7 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 8 years ago