netspooky / jLoot
JIRA Secure Attachment Looter
☆69Updated 4 years ago
Alternatives and similar repositories for jLoot
Users that are interested in jLoot are comparing it to the libraries listed below
Sorting:
- Burp with Friends☆103Updated 2 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- Scripts to extract files from SCM directories left on web servers☆36Updated last year
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- The Outlook HTML Leak Test Project☆41Updated 7 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 6 years ago
- Application and Service Fingerprinting☆133Updated 2 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated 10 months ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- ☆125Updated 5 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆113Updated 6 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Repo of useful scripts☆104Updated 4 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 6 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- An epic web shell☆84Updated 3 months ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Updated last year
- ☆148Updated 3 years ago
- Fetch known urls from AlienVault's Open Threat Exchange for given hosts☆62Updated 5 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- A collection of pen-testing/hacking scripts. Various uses.☆13Updated 4 years ago
- retrive metadata endpoint data with these one liners.☆38Updated 4 years ago
- Preventing malicious takeover of the retired slurp AWS tool☆40Updated 6 years ago
- A subdomain reconnaissance scanner☆35Updated 2 years ago
- Words list generator to crack security tokens☆110Updated 4 years ago
- Pillage a git repo found in an accessible web root☆61Updated 13 years ago