scottjpack / shellshock_scannerLinks
Python Scanner for "ShellShock" (CVE-2014-6271)
☆45Updated 11 years ago
Alternatives and similar repositories for shellshock_scanner
Users that are interested in shellshock_scanner are comparing it to the libraries listed below
Sorting:
- Java Untrusted Deserialization Exploits Tools☆67Updated 10 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Updated 9 years ago
- Juniper backdoor☆14Updated 10 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Updated 8 years ago
- ☆86Updated 8 years ago
- scripts used in my pentest work.☆44Updated 10 years ago
- CVE-2017-9791☆27Updated 8 years ago
- DoS PoC's for SAP products☆51Updated 7 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Updated 12 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 7 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Updated 8 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Updated 8 years ago
- ☆20Updated 2 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 7 years ago
- Vulners signature-base software version detection rules☆38Updated 4 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Updated 8 years ago
- ☆28Updated 8 years ago
- ☆46Updated 9 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- Flash XSS Scanner☆54Updated 9 years ago
- Advance URL Fuzzing + Whois Domain running on python☆18Updated 3 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- POC MS15-034☆33Updated 10 years ago
- ☆91Updated 4 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 12 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- 3.8.x - 4.2.3 ForumRunner (vBulletin) exploit Proof of Concept☆38Updated 8 years ago