k1rurk / check_bitrix
Check bitrix vulnerabilities
☆66Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for check_bitrix
- Some nuclei templates for pentest CMS Bitrix☆23Updated 4 months ago
- 1C RAS Offensive Security Tool☆24Updated last year
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆109Updated 4 months ago
- ☆264Updated last month
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆106Updated 2 weeks ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆70Updated 10 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆117Updated 2 years ago
- ☆135Updated 6 months ago
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆192Updated 3 months ago
- ☆28Updated last week
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆91Updated 3 months ago
- ☆91Updated 11 months ago
- ☆110Updated 9 months ago
- Custom scan profiles for use with Burp Suite Pro☆105Updated 8 months ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆140Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆134Updated this week
- ☆156Updated 2 months ago
- A burp suite extension that reviews backup, old, temporary and unreferenced files on web server for sensitive information (OWASP WSTG-CON…☆160Updated 7 months ago
- Enumerate / Dump Docker Registry☆163Updated 7 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆60Updated 10 months ago
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆35Updated 2 weeks ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆52Updated 3 weeks ago
- Self-hosted passive subdomain continous monitoring tool.☆156Updated 9 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆79Updated 5 months ago
- Session Hijacking Visual Exploitation☆194Updated 8 months ago
- Bundle of common passwords targeting RUSSIAN-speaking audience (parsed from big data leaks)☆94Updated 5 years ago
- ☆69Updated 6 months ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆26Updated 2 years ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆127Updated 9 months ago