jfrog / text4shell-toolsLinks
☆104Updated 2 years ago
Alternatives and similar repositories for text4shell-tools
Users that are interested in text4shell-tools are comparing it to the libraries listed below
Sorting:
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- A GraphQL enumeration and extraction tool☆131Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 8 months ago
- Apache Spark Shell Command Injection Vulnerability☆88Updated 2 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆106Updated 2 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆180Updated last year
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 2 years ago
- Text4Shell scanner for Burp Suite☆190Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆29Updated last year
- A robust Red Team proxy written in Go.☆160Updated 3 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 2 years ago
- Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.☆34Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated last week
- oauth-labs: an intentionally vulnerable set of OAuth 2.0 labs for security training and learning☆68Updated 6 months ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆94Updated 11 months ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- Repository to store exploits created by Assetnotes Security Research team☆178Updated last year
- ☆104Updated 2 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Updated 2 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆66Updated 2 years ago
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- PoC repository for CVE-2023-29007☆33Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Cloud agnostic IAM permissions enumerator☆149Updated last month
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆127Updated 2 years ago
- Utility for creating ZipSlip archives☆72Updated 2 years ago
- POC and Scanner for CVE-2023-24055☆65Updated 2 years ago
- Repository of CVE found by OCD people☆76Updated 11 months ago