kh4sh3i / ElasticSearch-PentestingLinks
ElasticSearch exploit and Pentesting guide for penetration tester
☆30Updated 3 years ago
Alternatives and similar repositories for ElasticSearch-Pentesting
Users that are interested in ElasticSearch-Pentesting are comparing it to the libraries listed below
Sorting:
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated 2 months ago
- ☆58Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- ☆27Updated 3 years ago
- ☆76Updated last month
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆115Updated 2 years ago
- ☆27Updated 2 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆125Updated 4 months ago
- ☆67Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 11 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 6 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆54Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆83Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆102Updated 2 years ago
- HTTP verb tampering & methods enumeration☆65Updated 5 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- Make better use of the embedded browser that comes by default with Burp☆44Updated 2 years ago
- ☆46Updated 2 months ago
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration☆45Updated 9 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated last week
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- ☆91Updated 2 years ago