Tool for scan vulnerabilities in Moodle platforms
☆97Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for moodlescan
Users that are interested in moodlescan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Moodle community-based vulnerability scanner☆60Jun 21, 2023Updated 2 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- ViewState Payload Generator☆26Aug 17, 2018Updated 7 years ago
- A tool for enumerating usernames from text, files, or websites☆83Jun 21, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.☆1,423Jan 19, 2024Updated 2 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- Quickly find all identities someone has used on their Github commits☆17Jul 28, 2024Updated last year
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 4 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,187Sep 11, 2024Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Feb 20, 2022Updated 4 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆17Mar 13, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A PoC tool for exploiting leaked process and thread handles☆34Feb 13, 2024Updated 2 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆27Oct 1, 2023Updated 2 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆76Mar 22, 2024Updated 2 years ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- String-based secret-searching tool (high entropy and regexes) based on truffleHog☆17Oct 21, 2021Updated 4 years ago
- ☆23Apr 14, 2017Updated 9 years ago
- Here is useful scripts collections. You can forge tickets locally with secret keys or certificates. It's useful when you want backdoor/pe…☆19Apr 6, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- Adobe Experience Manager Vulnerability Scanner☆187May 22, 2023Updated 2 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- Proxy-list management application for Django☆23Mar 5, 2018Updated 8 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆372Feb 12, 2024Updated 2 years ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- A collection of BBRF agents that can be deployed to AWS lambda☆24Nov 17, 2024Updated last year