staaldraad / turnerLinks
SOCKS5 and HTTP over TURN/STUN proxy
☆181Updated last year
Alternatives and similar repositories for turner
Users that are interested in turner are comparing it to the libraries listed below
Sorting:
- Exploitation toolkit for RichFaces☆104Updated last year
- Gopher Tomcat Deployer☆48Updated 6 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Updated 4 years ago
- SonicWall SSL-VPN Exploit☆175Updated 4 years ago
- ☆117Updated 5 years ago
- ☆143Updated 2 years ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆174Updated 5 years ago
- An Out-of-Band XXE server for retrieving file contents over FTP.☆181Updated 5 years ago
- PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Or…☆96Updated 5 years ago
- Gogs CVEs☆78Updated 5 years ago
- CVE-2018-13382☆148Updated 6 years ago
- Scan Victim Backup Directories & Backup Files☆180Updated last year
- Linux privilege escalation via LXD☆138Updated 5 years ago
- A python script to merge multiple jar files for easier debugging via JD-Eclipse☆61Updated 2 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆437Updated 2 years ago
- A malicious LDAP server for JNDI injection attacks☆75Updated 9 months ago
- Jackson Rce For CVE-2019-12384☆101Updated 6 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆263Updated 3 years ago
- ☆28Updated 4 years ago
- Tool to pentest spark clusters☆32Updated last year
- CVE 2021-21315 PoC☆157Updated 4 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆204Updated 2 years ago
- One stop place for exploiting Jira instances in your proximity☆190Updated last year
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆157Updated 4 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆76Updated 7 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆69Updated 8 years ago
- ☆215Updated 2 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆222Updated 4 years ago
- Example Vulnerable .NET HTTP Remoting☆86Updated 6 years ago