jfrog / text4shell-toolsLinks
☆104Updated 3 years ago
Alternatives and similar repositories for text4shell-tools
Users that are interested in text4shell-tools are comparing it to the libraries listed below
Sorting:
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- Repository to store exploits created by Assetnotes Security Research team☆179Updated 2 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- ☆106Updated 3 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 3 years ago
- Find CVE PoCs on GitHub☆157Updated 5 months ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Updated 2 years ago
- a deterministic finite automata ranker☆73Updated 3 years ago
- POC and Scanner for CVE-2023-24055☆65Updated 2 years ago
- Cloud agnostic IAM permissions enumerator☆161Updated 9 months ago
- ☆31Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 7 months ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 4 months ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- PoC repository for CVE-2023-29007☆35Updated 2 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆88Updated 3 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Apache Spark Shell Command Injection Vulnerability☆88Updated 3 years ago
- Repository of CVE found by OCD people☆83Updated 6 months ago
- Tools to assess DNS security.☆153Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆139Updated 2 months ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- ☆116Updated 2 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Updated last year