ironbee / ironbee-rulesLinks
IronBee Rules
☆18Updated 12 years ago
Alternatives and similar repositories for ironbee-rules
Users that are interested in ironbee-rules are comparing it to the libraries listed below
Sorting:
- ☆20Updated 2 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Updated 10 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 11 years ago
- A bunch of scripts used for network defense during competitions.☆15Updated 10 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Updated last year
- Files from Zeronights presentation.☆28Updated 13 years ago
- DoS PoC's for SAP products☆51Updated 8 years ago
- Simple development DNS server written in python☆26Updated 8 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 9 years ago
- Damn Small FI Scanner☆62Updated 6 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- Python Nessus Library - libnessus is a python library to enable devs to chat with nessus XMLRPC API, parse, store and diff scan results. …☆24Updated 2 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Updated 12 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Updated 6 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Automatically scans for malicious proxies.☆31Updated 10 years ago
- Splunk Web Shell☆51Updated 10 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Updated 9 years ago
- Cronbased Dirty Cow Exploit☆30Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- A collection of published exploits and proof-of-concept code.☆21Updated 8 years ago
- ☆46Updated 8 years ago