jfrog / text4shell-toolsLinks
☆104Updated 3 years ago
Alternatives and similar repositories for text4shell-tools
Users that are interested in text4shell-tools are comparing it to the libraries listed below
Sorting:
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- ☆106Updated 2 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Repository to store exploits created by Assetnotes Security Research team☆179Updated 2 years ago
- Find CVE PoCs on GitHub☆156Updated 4 months ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Updated 3 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Cloud agnostic IAM permissions enumerator☆161Updated 8 months ago
- POC and Scanner for CVE-2023-24055☆65Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32Updated 3 years ago
- a deterministic finite automata ranker☆72Updated 3 years ago
- ☆31Updated 2 years ago
- Repository of CVE found by OCD people☆83Updated 5 months ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆137Updated 6 months ago
- Tools to assess DNS security.☆153Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- PoC repository for CVE-2023-29007☆35Updated 2 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆138Updated last month
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- Tool to spray AWS Console IAM Logins☆34Updated 3 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆186Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year