projectdiscovery / network-fingerprintLinks
A fingerprint generation helper for nuclei network templates
☆73Updated 2 years ago
Alternatives and similar repositories for network-fingerprint
Users that are interested in network-fingerprint are comparing it to the libraries listed below
Sorting:
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆55Updated last year
- nuclei scanner for proxyshell ( CVE-2021-34473 )☆44Updated 2 years ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆62Updated 6 months ago
- CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server☆89Updated 2 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- A Proof of concept for CVE-2021-27850 affecting Apache Tapestry and leading to unauthencticated remote code execution.☆5Updated 2 years ago
- Burp Extension that lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap☆36Updated 3 years ago
- ☆26Updated last year
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Exploitation code for CVE-2021-40539☆46Updated 3 years ago
- A selection of rebuilt and from scratch exploits, scripts and ideas that can be used in red-teaming scenarios.☆5Updated last year
- Introduction to CYS4-SensitiveDiscoverer, a Burp extension that discovers sensitive information inside HTTP messages.☆20Updated 7 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆87Updated last year
- Zimbra RCE simple poc☆66Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆92Updated last year
- SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.☆51Updated 3 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆53Updated 10 months ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆66Updated last year
- ☆28Updated 3 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated 3 weeks ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆147Updated 3 years ago
- Nuclei templates for K8S security scanning☆101Updated 3 years ago
- Utility for creating ZipSlip archives☆73Updated 2 years ago
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆56Updated 2 years ago
- Example Vulnerable .NET HTTP Remoting☆85Updated 6 years ago
- ☆54Updated 3 years ago
- Exploits developed by Mikael Kall☆47Updated 2 years ago
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆81Updated 4 years ago