jgor / php-jpeg-shell
Simple PHP webshell with a JPEG header to bypass weak image verification checks
☆61Updated 9 years ago
Alternatives and similar repositories for php-jpeg-shell:
Users that are interested in php-jpeg-shell are comparing it to the libraries listed below
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆61Updated 5 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated last year
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- random notes☆45Updated 7 months ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆135Updated last year
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆36Updated 5 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 6 years ago
- Fuzzing for LFI using Burpsuite☆61Updated 8 years ago
- XSS Hunter Burp Plugin☆149Updated 6 years ago
- A simple exploit to execute system command on codiad☆65Updated 6 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Penetration Testing Notes and Playbook (PTP)☆175Updated 6 years ago
- Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layer…☆46Updated 6 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆39Updated 6 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- Resolve and quickly portscan a list of (sub)domains.☆86Updated 8 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆138Updated 5 years ago
- Albatar is a SQLi exploitation framework in Python☆134Updated 3 weeks ago
- A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any yea…☆80Updated 6 years ago
- ☆7Updated 7 years ago
- Damn Vulnerable File Upload V 1.1☆100Updated 6 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- Pillage a git repo found in an accessible web root☆60Updated 13 years ago
- ❄️ Research project for SubFinder core API V2☆36Updated 6 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago