kost / dvcs-ripper
Rip web accessible (distributed) version control systems: SVN/GIT/HG...
☆1,729Updated 9 months ago
Alternatives and similar repositories for dvcs-ripper:
Users that are interested in dvcs-ripper are comparing it to the libraries listed below
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,066Updated 2 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,929Updated last year
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,459Updated 5 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,625Updated 5 months ago
- 🕷️ A `.git` folder exploiting tool that is able to restore the entire Git repository, including stash, common branches and common tags.☆1,511Updated 3 months ago
- Pwn stuff.☆1,772Updated 2 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,398Updated 6 months ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,077Updated 2 months ago
- A .DS_Store file disclosure exploit. It parses .DS_Store file and downloads files recursively.☆1,634Updated 2 years ago
- Linux Exploit Suggester; based on operating system release number☆1,787Updated 10 years ago
- HackBar plugin for Burpsuite☆1,566Updated 4 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,077Updated 4 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,811Updated 3 years ago
- Weaponized web shell☆3,296Updated 6 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,053Updated 9 months ago
- Automatic SSRF fuzzer and exploitation tool☆3,180Updated 2 months ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆1,382Updated 3 years ago
- Collection of CTF Web challenges I made☆2,729Updated last year
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,458Updated 3 weeks ago
- Code-Audit-Challenges☆982Updated 6 years ago
- A `.git` folder disclosure exploit☆3,338Updated 2 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,098Updated last year
- Next-Generation Linux Kernel Exploit Suggester☆1,909Updated 2 years ago
- TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.☆1,611Updated 11 months ago
- Webshell && Backdoor Collection☆1,885Updated 5 years ago
- Web Content Discovery Tool☆902Updated 11 months ago
- Simple reverse ICMP shell☆1,584Updated 7 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆810Updated 7 years ago
- Venom - A Multi-hop Proxy for Penetration Testers☆2,074Updated 2 years ago
- MS17-010☆2,187Updated last year