sensepost / jack
Drag and Drop ClickJacking PoC development assistance tool.
☆195Updated 4 years ago
Alternatives and similar repositories for jack:
Users that are interested in jack are comparing it to the libraries listed below
- Frontpage and Sharepoint fingerprinting and attack tool.☆282Updated 3 years ago
- Snarf man-in-the-middle / relay suite☆203Updated 8 years ago
- ☆239Updated 5 years ago
- An automated XSS payload generator written in python.☆315Updated 8 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago
- Shodan HQ nmap plugin - passively scan targets☆152Updated 9 years ago
- Auto Domain Admin and Network Exploitation.☆298Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆305Updated 4 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆275Updated 9 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- A Blind SQL Exploitation application☆79Updated 12 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- An automated SMB relay exploitation script.☆152Updated 8 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆171Updated last year
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆364Updated 7 months ago
- Penetration testing scripts☆141Updated 6 years ago
- Automated Responder/secretsdump.py cracking☆182Updated 8 years ago
- Local File Inclusion Exploitation Tool (mirror)☆123Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆352Updated 6 years ago
- udp-proto-scanner is a Perl script which discovers UDP services by sending triggers to a list of hosts☆98Updated 9 months ago
- ☆192Updated 6 years ago
- ☆189Updated 7 months ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- ☆120Updated 7 years ago
- ☆180Updated 11 years ago
- locate and attack Lync/Skype for Business☆336Updated 5 months ago
- Web Application Security☆125Updated 9 months ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆165Updated 7 years ago