ironbee / ironbee-rulesLinks
IronBee Rules
☆18Updated 11 years ago
Alternatives and similar repositories for ironbee-rules
Users that are interested in ironbee-rules are comparing it to the libraries listed below
Sorting:
- ☆20Updated last year
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A bunch of scripts used for network defense during competitions.☆15Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Juniper backdoor☆13Updated 9 years ago
- Try harder to bypass that WAF...☆13Updated 10 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 10 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- Projects and POCs☆60Updated 10 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- ssh key exchange layer for scapy☆13Updated 10 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- ☆14Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- scripts used in my pentest work.☆44Updated 9 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆33Updated 9 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- ☆46Updated 7 years ago
- A collection of published exploits and proof-of-concept code.☆21Updated 7 years ago
- Memcache hacking tool.☆47Updated 8 years ago
- Ruby interface to cirt.net default passwords database☆19Updated 14 years ago