Tool for scan vulnerabilities in Moodle platforms
☆96Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for moodlescan
Users that are interested in moodlescan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Moodle community-based vulnerability scanner☆59Jun 21, 2023Updated 2 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Dec 13, 2022Updated 3 years ago
- ViewState Payload Generator☆26Aug 17, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.☆1,414Jan 19, 2024Updated 2 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 3 years ago
- Quickly find all identities someone has used on their Github commits☆15Jul 28, 2024Updated last year
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)☆16May 9, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,177Sep 11, 2024Updated last year
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Feb 20, 2022Updated 4 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆17Mar 13, 2024Updated 2 years ago
- A PoC tool for exploiting leaked process and thread handles☆33Feb 13, 2024Updated 2 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆27Oct 1, 2023Updated 2 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆76Mar 22, 2024Updated 2 years ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- String-based secret-searching tool (high entropy and regexes) based on truffleHog☆17Oct 21, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆22Apr 14, 2017Updated 8 years ago
- The state of my kubernetes cluster☆10Updated this week
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- Adobe Experience Manager Vulnerability Scanner☆186May 22, 2023Updated 2 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆369Feb 12, 2024Updated 2 years ago
- Proxy-list management application for Django☆23Mar 5, 2018Updated 8 years ago