☆104Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for text4shell-tools
Users that are interested in text4shell-tools are comparing it to the libraries listed below
Sorting:
- Text4Shell scanner for Burp Suite☆189Oct 27, 2022Updated 3 years ago
- ☆18Mar 26, 2024Updated last year
- ☆11Aug 31, 2023Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated this week
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 7 months ago
- ☆16Oct 18, 2024Updated last year
- ☆64Aug 15, 2023Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- Secrets scanner that understands code☆192Nov 2, 2023Updated 2 years ago
- Exploits targeting vBulletin.☆75Apr 15, 2023Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆24Mar 16, 2024Updated last year
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- ☆20Jan 9, 2024Updated 2 years ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 3 weeks ago
- Discover hidden debugging parameters and uncover web application secrets☆247Feb 4, 2026Updated 3 weeks ago
- Documentation and proofs of concept on the polyglot file PEDICOM (PE executable + DICOM)☆38Apr 10, 2019Updated 6 years ago
- Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC☆41Nov 19, 2022Updated 3 years ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- ☆152Feb 20, 2023Updated 3 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Jan 12, 2025Updated last year
- tool for generating wordlists or extending an existing one using mutations.☆392Feb 1, 2026Updated 3 weeks ago
- Retrieve AD accounts description and search for password in it☆82Jul 21, 2022Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 2 months ago
- ☆27May 1, 2023Updated 2 years ago
- Kernel sources for the Pixel 4, Pixel 4 XL and Pixel 4a.☆19Jan 27, 2025Updated last year
- Analyse your malware to surgically obfuscate it☆519Dec 17, 2025Updated 2 months ago
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)☆96Sep 1, 2023Updated 2 years ago
- Black box fuzzer for web applications☆437Jul 20, 2025Updated 7 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- ☆223Oct 22, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago