A python script to scan for Apache Tomcat server vulnerabilities.
☆894Jan 12, 2026Updated 3 months ago
Alternatives and similar repositories for ApacheTomcatScanner
Users that are interested in ApacheTomcatScanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,948Oct 7, 2023Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,237Apr 24, 2026Updated last week
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,278Apr 23, 2026Updated last week
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆377Jul 25, 2023Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆133Oct 1, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,985Oct 4, 2025Updated 7 months ago
- bypass-url-parser☆1,125Apr 25, 2026Updated last week
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆431Nov 12, 2025Updated 5 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆648Mar 20, 2024Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,076Mar 24, 2026Updated last month
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,606Apr 12, 2026Updated 3 weeks ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆739Sep 3, 2025Updated 8 months ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,546Mar 8, 2026Updated last month
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,511Jan 8, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,170Apr 28, 2026Updated last week
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆535Dec 4, 2024Updated last year
- Rockyou for web fuzzing☆3,141Mar 11, 2026Updated last month
- New generation of wmiexec.py☆1,282Apr 26, 2026Updated last week
- An IIS short filename enumeration tool☆1,153Nov 25, 2024Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆803Apr 2, 2026Updated last month
- Automatic SSRF fuzzer and exploitation tool☆3,534Sep 4, 2025Updated 8 months ago
- declutters url lists for crawling/pentesting☆1,551Feb 23, 2025Updated last year
- Dumping DPAPI credz remotely☆1,367Mar 24, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆2,257Nov 24, 2023Updated 2 years ago
- ☆836Sep 9, 2022Updated 3 years ago
- The most powerful CRLF injection (HTTP Response Splitting) scanner.☆595Oct 17, 2023Updated 2 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆230Jan 31, 2025Updated last year
- Nuclei plugin for BurpSuite☆1,329Oct 22, 2025Updated 6 months ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,588Mar 4, 2024Updated 2 years ago
- A simple tool for bypassing file upload restrictions.☆901Jul 22, 2024Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆91May 2, 2024Updated 2 years ago
- Extract credentials from lsass remotely☆2,200Mar 23, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,145Oct 21, 2024Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,481Apr 23, 2026Updated last week
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- Real-world infosec wordlists, updated regularly☆1,746Updated this week
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆587Sep 25, 2025Updated 7 months ago
- A Python script to find tenant id an region from a list of domain names.☆21Jan 31, 2025Updated last year
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,642Aug 6, 2022Updated 3 years ago