orleven / Tentacle
Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It supports calls to zoomeye, fofa, shodan and other APIs to perform bulk vulnerability verification for multiple targets.
☆374Updated 10 months ago
Alternatives and similar repositories for Tentacle:
Users that are interested in Tentacle are comparing it to the libraries listed below
- A list of useful payloads for Web Application Security and Pentest/CTF☆296Updated 5 months ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆513Updated 4 years ago
- Weblogic IIOP CVE-2020-2551☆332Updated 4 years ago
- An exquisite dns&http log server for verify SSRF/XXE/RFI/RCE vulnerability☆469Updated last year
- Cnvd-2020-10487 / cve-2020-1938, scanner tool☆293Updated 3 years ago
- 用于漏洞排查的pocsuite3验证POC代码☆347Updated 2 years ago
- SQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.☆428Updated 8 months ago
- Here you can find mostly all disclosed h1 reports☆346Updated 3 years ago
- CVE-2020-5902 BIG-IP☆371Updated 3 years ago
- A multi threads web application source leak scanner☆385Updated 6 months ago
- ☆261Updated 4 years ago
- WAF Bypass Cheatsheet☆210Updated 7 years ago
- MySQL fake server for read files of connected clients☆591Updated 7 years ago
- Gather sensitive information from (.idea) folder for pentesters☆362Updated 2 years ago
- CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc☆119Updated 4 years ago
- Awesome webshell collection. Including 150 Github repo, and 200+ blog posts.☆167Updated 5 years ago
- Redis 4.x/5.x RCE☆944Updated 3 years ago
- CVE-2020–14882、CVE-2020–14883☆282Updated 4 years ago
- burpsuite extension for check unauthorized vulnerability☆230Updated 4 years ago
- WebLogic wls9-async反序列化远程命令执行漏洞☆241Updated 5 years ago
- Nmap&Zmap特征识别,绕过IDS探测☆326Updated 5 years ago
- Bypassing WAF by abusing SSL/TLS Ciphers☆311Updated 3 years ago
- RedTeam资料收集整理☆327Updated 4 years ago
- CVE-2019-2725 命令回显☆437Updated last year
- Vulnerabilities of Goby supported with exploitation.☆710Updated last month
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆139Updated 5 years ago
- BurpBounty 魔改版本☆413Updated 2 years ago