pandujar / elasticpwnLinks
Scripts for ElasticSearch vulns
☆13Updated 10 years ago
Alternatives and similar repositories for elasticpwn
Users that are interested in elasticpwn are comparing it to the libraries listed below
Sorting:
- ☆35Updated 9 years ago
- scripts used in my pentest work.☆44Updated 9 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- Memcache hacking tool.☆47Updated 8 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Updated 8 years ago
- A webshell connection tool with customized WAF bypass payloads☆125Updated 7 years ago
- ☆83Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Updated 7 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 8 years ago
- Axis2 RPC Shell☆15Updated 10 years ago
- PHP root (suid) reverse shell☆74Updated 8 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- ☆20Updated last year
- SA-CORE-2018-004 POC #drupalgeddon3☆42Updated 7 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- Image size issues plugin for Burp Suite☆95Updated 7 years ago
- General Scripts to help with various types of SQL Injection☆30Updated 11 years ago
- ☆22Updated 9 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 11 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 9 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 13 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Updated 7 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- ☆86Updated 8 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Updated 10 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Updated 8 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Updated 10 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Updated 7 years ago