mhaskar / RCEScanner
Simple python script to extract unsafe functions from php projects
☆199Updated 7 years ago
Alternatives and similar repositories for RCEScanner:
Users that are interested in RCEScanner are comparing it to the libraries listed below
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- Various Payload wordlists☆235Updated 4 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆266Updated 2 months ago
- A mini webserver with FTP support for XXE payloads☆329Updated last year
- Everything you need about Burp Extension Generation☆152Updated 2 years ago
- ☆128Updated 7 years ago
- Burp Suite Extension to monitor new scope☆196Updated 4 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆271Updated 4 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆247Updated 2 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆202Updated last year
- this contain the burp pack☆207Updated 8 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆155Updated 4 years ago
- Changes for Visual Studio 2013☆116Updated 9 years ago
- Linux post exploitation enumeration and exploit checking tools☆179Updated 4 years ago
- ☆281Updated 3 years ago
- Search Exploitable Software on Linux☆227Updated last year
- ☆264Updated 6 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆258Updated 3 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆256Updated 2 years ago
- Proof of concept for CVE-2020-5902☆72Updated 4 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆429Updated 2 years ago
- Lesser Known Web Attack Lab☆330Updated 5 years ago
- CVE-2018-13379☆253Updated 5 years ago
- ☆137Updated 7 years ago
- An automated target reconnaissance pipeline.☆429Updated 2 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆140Updated 3 years ago
- Fuzzing Payloads to Assist in Web Application Testing.☆166Updated 5 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆350Updated 3 weeks ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆285Updated 2 months ago