☆104Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for text4shell-tools
Users that are interested in text4shell-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Text4Shell scanner for Burp Suite☆189Oct 27, 2022Updated 3 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- ☆65Aug 15, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆16Oct 18, 2024Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.☆34Oct 20, 2022Updated 3 years ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆56Dec 29, 2023Updated 2 years ago
- Trace function calls using lldb☆13Jul 5, 2021Updated 4 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Mar 30, 2026Updated last week
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆17Nov 26, 2019Updated 6 years ago
- ☆107Jan 4, 2023Updated 3 years ago
- Secrets scanner that understands code☆192Nov 2, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- ☆11Dec 28, 2021Updated 4 years ago
- ☆11Jul 14, 2020Updated 5 years ago
- Exploits targeting vBulletin.☆74Apr 15, 2023Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆81Jul 21, 2022Updated 3 years ago
- ☆152Feb 20, 2023Updated 3 years ago
- CVE-2022-41852 Proof of Concept (unofficial)☆75Oct 20, 2022Updated 3 years ago
- Kernel sources for the Pixel 4, Pixel 4 XL and Pixel 4a.☆19Jan 27, 2025Updated last year
- Identify VMess packets in network traffic☆13Nov 21, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC☆41Nov 19, 2022Updated 3 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,138Oct 21, 2024Updated last year
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- ☆231Dec 18, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- See https://gitlab.com/pandasauce/qsee-ta-tool for an up-to-date version☆13May 18, 2018Updated 7 years ago
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)☆96Sep 1, 2023Updated 2 years ago
- Discover hidden debugging parameters and uncover web application secrets☆246Feb 4, 2026Updated 2 months ago
- PoC☆12Apr 7, 2025Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 3 months ago
- tool for generating wordlists or extending an existing one using mutations.☆390Feb 1, 2026Updated 2 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago