Pentesting Apache Tomcat 101
☆14Apr 4, 2023Updated 2 years ago
Alternatives and similar repositories for Pentest-Tomcat
Users that are interested in Pentest-Tomcat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- Apache Tomcat exploit and Pentesting guide for penetration tester☆66Sep 2, 2022Updated 3 years ago
- Joomla login bruteforce☆108Jul 18, 2024Updated last year
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆24Feb 27, 2023Updated 3 years ago
- CryptoKnightX é uma ferramenta para criptografar arquivos utilizando GnuPG.☆10Sep 28, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)☆35May 1, 2018Updated 7 years ago
- This exploit allows to connect to the remote RemoteMouse 3.008 service to virtually press arbitrary keys and execute code on the machine.☆66Feb 11, 2025Updated last year
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆31Mar 7, 2026Updated 3 weeks ago
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Oct 8, 2018Updated 7 years ago
- ☆31Mar 20, 2026Updated last week
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆46Oct 29, 2023Updated 2 years ago
- Dynamic Environment☆11Nov 14, 2025Updated 4 months ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆111Jul 22, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- ☆16Feb 5, 2022Updated 4 years ago
- Cli tool to pass arguments to nix flakes☆10May 6, 2024Updated last year
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- Grab images and videos and more from Instagram☆17Sep 19, 2020Updated 5 years ago
- ☆10May 28, 2025Updated 10 months ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated 2 years ago
- Red Insight is a comprehensive repository dedicated to documenting penetration testing techniques, tools, and findings. It serves as a re…☆19Sep 16, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- nixpkgs aiming for exploiting tools, which may include non-official package or difficult to push to mainstream.☆13Jul 25, 2022Updated 3 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 3 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆131Aug 20, 2018Updated 7 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆13Aug 22, 2025Updated 7 months ago
- KeySec Hunter is a **Chrome extension** that scans webpages and linked JavaScript files for **user-defined keywords** and **potential sec…☆59Dec 21, 2025Updated 3 months ago
- convert case style of words☆59Jan 12, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- DRILL (Distributable Remote Integrated Lightweight Link) is a powerful and stealthy Command and Control (C2) framework designed for seaml…☆34Jul 31, 2025Updated 7 months ago
- SPIP BigUp Plugin Unauthenticated RCE☆16Sep 7, 2024Updated last year
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated last month
- Dockerized version of INetSim☆20Apr 24, 2023Updated 2 years ago
- A tool to show only printable characters of a file☆11Oct 2, 2023Updated 2 years ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22May 13, 2023Updated 2 years ago
- Programa para criação de template de Shell Script, deixe tudo organizado como deve ser! Seus programas serão mais profissionais com o She…☆18Jan 7, 2022Updated 4 years ago