A straightforward tool for exploiting SMTP Smuggling vulnerabilities.
☆14Jul 22, 2024Updated last year
Alternatives and similar repositories for SmuggleTP
Users that are interested in SmuggleTP are comparing it to the libraries listed below
Sorting:
- PoC☆12Apr 7, 2025Updated 10 months ago
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- ☆106Dec 20, 2025Updated 2 months ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Aug 4, 2021Updated 4 years ago
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated 11 months ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆13Aug 23, 2024Updated last year
- Web cache poisoning vulnerability scanner.☆73May 5, 2022Updated 3 years ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated last year
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- Playground for Race Condition attack☆24Mar 18, 2023Updated 2 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆77Oct 6, 2023Updated 2 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- Tool to extract & validate google fcm server keys from apks☆29Jan 20, 2021Updated 5 years ago
- Windows Thread Pool Injection Havoc Implementation☆33Mar 23, 2024Updated last year
- Script 4 telegram search☆13Aug 25, 2018Updated 7 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- [Custom || Automated] Curation & Collection of BugBounty Wordlists☆63Feb 22, 2026Updated last week
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- experimental wildcard subdomain filtering prototype☆16Aug 5, 2023Updated 2 years ago
- ☆13Apr 25, 2024Updated last year
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- goverview - Get an overview of the list of URLs☆142Dec 5, 2025Updated 2 months ago
- Website FingerPrint Recognition☆84Nov 24, 2021Updated 4 years ago
- ☆59May 8, 2024Updated last year
- Tools for finding SMTP smuggling vulnerabilities.☆143Mar 26, 2024Updated last year