joesmithjaffa / jenkins-shellLinks
Automating Jenkins Hacking using Shodan API
☆94Updated 7 years ago
Alternatives and similar repositories for jenkins-shell
Users that are interested in jenkins-shell are comparing it to the libraries listed below
Sorting:
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- A web application for generating custom XSS payloads☆77Updated 5 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- XSS Hunter Burp Plugin☆150Updated 6 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- Some scripts and exploits☆146Updated 7 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Updated 2 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- ☆92Updated 2 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- The simplest way to take an automated screenshot of given URLs. Easy installation! Edit☆48Updated 7 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 5 years ago