joesmithjaffa / jenkins-shellLinks
Automating Jenkins Hacking using Shodan API
☆94Updated 7 years ago
Alternatives and similar repositories for jenkins-shell
Users that are interested in jenkins-shell are comparing it to the libraries listed below
Sorting:
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- A web application for generating custom XSS payloads☆77Updated 5 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Some scripts and exploits☆146Updated 6 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆113Updated 6 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 5 years ago
- An interactive OOB XXE data exfiltration tool☆90Updated 8 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- The simplest way to take an automated screenshot of given URLs. Easy installation! Edit☆48Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 7 years ago
- Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.☆64Updated 6 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Updated 6 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Updated 2 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Updated 4 years ago