mthbernardes / LFI-EnumLinks
Scripts to execute enumeration via LFI
☆90Updated 6 years ago
Alternatives and similar repositories for LFI-Enum
Users that are interested in LFI-Enum are comparing it to the libraries listed below
Sorting:
- Enyx SNMP IPv6 Enumeration Tool☆106Updated 3 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆135Updated 6 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago
- Custom tools and projects about security☆110Updated 6 months ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆113Updated 5 years ago
- ☆121Updated 8 years ago
- Linux Local Privesc Helper and Agent☆167Updated 6 years ago
- Preventing malicious takeover of the retired slurp AWS tool☆41Updated 7 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆44Updated 5 years ago
- Words list generator to crack security tokens☆111Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 7 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated last year
- Miscellaneous pentesting scripts for OSCP☆59Updated 7 years ago
- An epic web shell☆85Updated 7 months ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- A natural evolution of Burp Suite's Repeater tool☆94Updated 2 years ago
- ☆48Updated 6 years ago
- udp-proto-scanner is a Perl script which discovers UDP services by sending triggers to a list of hosts☆102Updated last year
- Just some exploits :P☆47Updated 5 years ago
- A Linux enumeration script for Hack The Box☆191Updated 6 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆49Updated 10 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆269Updated 8 years ago
- JIRA Secure Attachment Looter☆71Updated 5 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Updated 3 years ago
- Linux privilege escalation via LXD☆141Updated 5 years ago
- vulnerable single sign on☆151Updated last year
- Automatically exported from code.google.com/p/fuzzdb☆64Updated 3 years ago