joesmithjaffa / jenkins-shellView external linksLinks
Automating Jenkins Hacking using Shodan API
☆94Mar 24, 2018Updated 7 years ago
Alternatives and similar repositories for jenkins-shell
Users that are interested in jenkins-shell are comparing it to the libraries listed below
Sorting:
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 5 years ago
- ☆80Nov 2, 2019Updated 6 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Mar 12, 2018Updated 7 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126May 25, 2018Updated 7 years ago
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Dec 1, 2016Updated 9 years ago
- writeups for Capture The Flag Competitions☆16May 31, 2022Updated 3 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆29Oct 18, 2021Updated 4 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- Contacts Synchronization Private Directory Public Directory City Search Profession Search☆11Oct 21, 2017Updated 8 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- Practice Web App written in python with some vulnerabilities.☆34Mar 19, 2021Updated 4 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆37Aug 12, 2019Updated 6 years ago
- search for hosts info with shodan☆233Jun 14, 2021Updated 4 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- scripts for pentesting☆86Aug 21, 2018Updated 7 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆262Nov 15, 2020Updated 5 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- ☆13Jul 14, 2020Updated 5 years ago