netspooky / jLootLinks
JIRA Secure Attachment Looter
☆71Updated 5 years ago
Alternatives and similar repositories for jLoot
Users that are interested in jLoot are comparing it to the libraries listed below
Sorting:
- Burp with Friends☆103Updated 3 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆116Updated 6 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 7 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- Linux Local Privesc Helper and Agent☆167Updated 6 years ago
- ☆128Updated 6 years ago
- Words list generator to crack security tokens☆111Updated 5 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated 2 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Burp Suite Importer - Connect to multiple web servers while populating the sitemap.☆47Updated 5 years ago
- Containerized version of my fork of Nahamsec's Lazyrecon.☆51Updated 6 months ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆135Updated 6 years ago
- Scripts to extract files from SCM directories left on web servers☆36Updated 2 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Updated 6 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- S3 bucket enumerator☆44Updated 8 years ago
- Scripts to execute enumeration via LFI☆90Updated 6 years ago
- The Outlook HTML Leak Test Project☆41Updated 7 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Updated 5 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 6 years ago
- Preventing malicious takeover of the retired slurp AWS tool☆41Updated 7 years ago
- vulnerable single sign on☆151Updated last year
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 3 years ago
- Application and Service Fingerprinting☆132Updated 3 years ago
- A Github Repository Created to compliment a BSides Canberra 2018 talk on SharePoint Security.☆48Updated 7 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Updated 6 years ago
- Burp Suite extension to perform Kerberos authentication☆106Updated last year
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago
- Burp Extension for AWS Signing☆90Updated last year