nccgroup / shocker
A tool to find and exploit servers vulnerable to Shellshock
☆333Updated last year
Related projects ⓘ
Alternatives and complementary repositories for shocker
- A unique automated LFi Exploiter with Bind/Reverse Shells☆267Updated 9 years ago
- Github for the scripts utilised during Penetration test☆236Updated 7 years ago
- locate and attack Lync/Skype for Business☆334Updated last month
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆423Updated 4 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆256Updated 3 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆887Updated 4 years ago
- Linux post exploitation enumeration and exploit checking tools☆176Updated 4 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆514Updated 4 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Scripts that are useful for me on pen tests☆525Updated 2 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆253Updated 5 months ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆568Updated 5 months ago
- Windows Pentest Scripts☆227Updated 6 years ago
- An exploit for Apache Struts CVE-2018-11776☆301Updated 6 years ago
- Local File Inclusion Exploitation Tool (mirror)☆122Updated 7 years ago
- Penetration testing scripts☆143Updated 6 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆277Updated 3 years ago
- Collection of different exploits☆181Updated 4 years ago
- Post Exploitation Wiki☆514Updated 4 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆270Updated 3 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆308Updated 3 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆559Updated 9 years ago
- an asynchronous target enumeration tool☆239Updated last year
- Network reconnaissance and vulnerability assessment tools.☆395Updated 2 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆251Updated last year
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆390Updated 7 years ago
- Search Exploitable Software on Linux☆222Updated last year
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆415Updated 7 months ago
- Smart Install Exploitation Tool☆572Updated 2 years ago