A python script to scan for Apache Tomcat server vulnerabilities.
☆889Jan 12, 2026Updated 2 months ago
Alternatives and similar repositories for ApacheTomcatScanner
Users that are interested in ApacheTomcatScanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,941Oct 7, 2023Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,209Jan 5, 2026Updated 2 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,273Dec 9, 2025Updated 3 months ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆374Jul 25, 2023Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆133Oct 1, 2023Updated 2 years ago
- bypass-url-parser☆1,118Mar 14, 2026Updated last week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,953Oct 4, 2025Updated 5 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated 2 years ago
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆431Nov 12, 2025Updated 4 months ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆733Sep 3, 2025Updated 6 months ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,555Mar 16, 2026Updated last week
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆987Jan 12, 2024Updated 2 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,533Mar 8, 2026Updated 2 weeks ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,503Jan 8, 2026Updated 2 months ago
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆534Dec 4, 2024Updated last year
- New generation of wmiexec.py☆1,269Jan 5, 2026Updated 2 months ago
- Rockyou for web fuzzing☆3,094Mar 11, 2026Updated last week
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,122Feb 27, 2026Updated 3 weeks ago
- An IIS short filename enumeration tool☆1,132Nov 25, 2024Updated last year
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- Automatic SSRF fuzzer and exploitation tool☆3,505Sep 4, 2025Updated 6 months ago
- The most powerful CRLF injection (HTTP Response Splitting) scanner.☆593Oct 17, 2023Updated 2 years ago
- ☆832Sep 9, 2022Updated 3 years ago
- declutters url lists for crawling/pentesting☆1,538Feb 23, 2025Updated last year
- Dumping DPAPI credz remotely☆1,348Mar 24, 2025Updated 11 months ago
- ☆2,214Nov 24, 2023Updated 2 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆229Jan 31, 2025Updated last year
- Nuclei plugin for BurpSuite☆1,324Oct 22, 2025Updated 5 months ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,585Mar 4, 2024Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆786Updated this week
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆90May 2, 2024Updated last year
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,135Oct 21, 2024Updated last year
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆581Sep 25, 2025Updated 5 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- Real-world infosec wordlists, updated regularly☆1,725Updated this week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,352Mar 13, 2026Updated last week
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,634Aug 6, 2022Updated 3 years ago
- Extract credentials from lsass remotely☆2,184Dec 24, 2025Updated 2 months ago
- A simple tool for bypassing file upload restrictions.☆894Jul 22, 2024Updated last year