shelld3v / PwnVPN
The best exploitation tool for SSL VPN 0day vulnerabilities.
☆81Updated 3 years ago
Alternatives and similar repositories for PwnVPN
Users that are interested in PwnVPN are comparing it to the libraries listed below
Sorting:
- A python library to automate time-based blind SQL injection☆50Updated 5 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64Updated 3 years ago
- Pentest stuff☆49Updated last year
- A JavaScript components vulnerability scanner, based on RetireJS☆36Updated 4 years ago
- ☆47Updated 4 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆67Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- DNS hijacking via dead records automation tool☆52Updated 4 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆156Updated 4 years ago
- Scanner For Nginx - Remote Integer Overflow Vulnerability☆35Updated last month
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- Add headers to all Burp requests to bypass some WAF products☆40Updated last year
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆56Updated 2 years ago
- Database to store previously found subdomains☆64Updated 2 months ago
- ☆27Updated 4 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Updated 4 years ago
- A tool written in python for scraping firebase data☆42Updated 5 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 2 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 5 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Python bind shell single line code for both Unix and Windows, used to find and exploit RCE (ImageMagick, Ghostscript, ...)☆32Updated 3 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Writeup of CVE-2020-15906☆48Updated 4 years ago