A python script to scan for Apache Tomcat server vulnerabilities.
☆887Jan 12, 2026Updated last month
Alternatives and similar repositories for ApacheTomcatScanner
Users that are interested in ApacheTomcatScanner are comparing it to the libraries listed below
Sorting:
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,941Oct 7, 2023Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,188Jan 5, 2026Updated last month
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,263Dec 9, 2025Updated 2 months ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆374Jul 25, 2023Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- bypass-url-parser☆1,115Updated this week
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆730Sep 3, 2025Updated 6 months ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,524Jan 15, 2026Updated last month
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,925Oct 4, 2025Updated 4 months ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,098Updated this week
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,519Updated this week
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆534Dec 4, 2024Updated last year
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,497Jan 8, 2026Updated last month
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆978Jan 12, 2024Updated 2 years ago
- Rockyou for web fuzzing☆3,028Feb 11, 2026Updated 2 weeks ago
- New generation of wmiexec.py☆1,254Jan 5, 2026Updated last month
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆427Nov 12, 2025Updated 3 months ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆132Oct 1, 2023Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆779Oct 16, 2025Updated 4 months ago
- Real-world infosec wordlists, updated regularly☆1,640Feb 24, 2026Updated last week
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,583Mar 4, 2024Updated last year
- ☆2,202Nov 24, 2023Updated 2 years ago
- The most powerful CRLF injection (HTTP Response Splitting) scanner.☆593Oct 17, 2023Updated 2 years ago
- Dumping DPAPI credz remotely☆1,328Mar 24, 2025Updated 11 months ago
- An IIS short filename enumeration tool☆1,123Nov 25, 2024Updated last year
- ☆829Sep 9, 2022Updated 3 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,128Oct 21, 2024Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,259Updated this week
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,051Nov 9, 2024Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- Nuclei plugin for BurpSuite☆1,322Oct 22, 2025Updated 4 months ago
- Automatic SSRF fuzzer and exploitation tool☆3,489Sep 4, 2025Updated 5 months ago
- A simple tool for bypassing file upload restrictions.☆894Jul 22, 2024Updated last year
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,029Jul 12, 2025Updated 7 months ago
- Extract credentials from lsass remotely☆2,180Dec 24, 2025Updated 2 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,303Updated this week
- Tool for Active Directory Certificate Services enumeration and abuse☆3,401Feb 18, 2026Updated last week
- The swiss army knife of LSASS dumping☆2,072Sep 17, 2024Updated last year