jfrog / text4shell-toolsLinks
☆104Updated 3 years ago
Alternatives and similar repositories for text4shell-tools
Users that are interested in text4shell-tools are comparing it to the libraries listed below
Sorting:
- Repository to store exploits created by Assetnotes Security Research team☆180Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- A GraphQL enumeration and extraction tool☆134Updated 3 years ago
- Cloud Exploit Framework☆113Updated 3 years ago
- ☆106Updated 3 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆101Updated 3 years ago
- Find CVE PoCs on GitHub☆160Updated 6 months ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 3 years ago
- a deterministic finite automata ranker☆73Updated 4 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆88Updated 3 years ago
- ☆31Updated 3 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 5 months ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 8 months ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆87Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- Tool to spray AWS Console IAM Logins☆35Updated 3 years ago
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆134Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆140Updated 3 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated 2 years ago
- Repository of CVE found by OCD people☆83Updated 7 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆115Updated last year
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago
- Cloud agnostic IAM permissions enumerator☆161Updated 9 months ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated 2 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- ☆116Updated 2 years ago
- Tools to assess DNS security.☆153Updated last year