joernchen / DeviseDoorLinks
RoR / Devise PoC in memory Backdoor
☆29Updated 10 years ago
Alternatives and similar repositories for DeviseDoor
Users that are interested in DeviseDoor are comparing it to the libraries listed below
Sorting:
- RubySec Field Guide☆40Updated 2 years ago
- Blind SQL injection exploitation tool written in ruby.☆98Updated 11 months ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58Updated 10 years ago
- ☆49Updated 8 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆141Updated 4 years ago
- Ruby library for SHODAN☆75Updated 5 years ago
- Perform timing attacks against web applications☆123Updated 6 years ago
- Rex provides a variety of classes useful for security testing and exploit development.☆51Updated 2 years ago
- Parse HTTP Security Headers☆40Updated last year
- ☆10Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆124Updated 10 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Updated 13 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 11 years ago
- An evolving hacking framework written in python☆11Updated 10 years ago
- Social Engineering Abusing Google App Scripts☆24Updated 8 years ago
- Faraday Continuous Scanning☆34Updated 9 years ago
- A BurpSuite extension for lair☆28Updated 8 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Ruby Bind and Reverse Shells I wrote using standard libs. Bind Shell includes authentication while reverse does not. Standard libs only s…☆12Updated 12 years ago
- Slides from previous conference talks☆41Updated 8 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Tool for automation of GUI-based testing.☆16Updated 10 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago