staaldraad / turnerLinks
SOCKS5 and HTTP over TURN/STUN proxy
☆184Updated last year
Alternatives and similar repositories for turner
Users that are interested in turner are comparing it to the libraries listed below
Sorting:
- Exploitation toolkit for RichFaces☆104Updated last year
- Gopher Tomcat Deployer☆48Updated 6 years ago
- ☆142Updated 2 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆108Updated 4 years ago
- Gogs CVEs☆79Updated 5 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Or…☆96Updated 5 years ago
- HTTPWookiee is an HTTP server and proxy stress tool (respect of RFC, HTTP Smuggling issues, etc). If you run an HTTP server project conta…☆50Updated 7 years ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆176Updated 5 years ago
- An Out-of-Band XXE server for retrieving file contents over FTP.☆183Updated 5 years ago
- CVE-2018-13382☆147Updated 6 years ago
- Tool to pentest spark clusters☆32Updated last year
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆263Updated 3 years ago
- DupeKeyInjector☆136Updated 3 years ago
- Scan Victim Backup Directories & Backup Files☆180Updated 2 years ago
- ☆117Updated 5 years ago
- Fedora 31 netkit-telnet-0.17 telnetd remote exploit☆42Updated 5 years ago
- A malicious LDAP server for JNDI injection attacks☆75Updated 10 months ago
- A python script to merge multiple jar files for easier debugging via JD-Eclipse☆62Updated 2 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆222Updated 5 years ago
- research☆151Updated last year
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆350Updated 2 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆440Updated 3 years ago
- ☆27Updated 5 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆156Updated 4 years ago
- HTTP.ninja☆151Updated 2 years ago
- Linux privilege escalation via LXD☆139Updated 5 years ago
- Jackson Rce For CVE-2019-12384☆102Updated 6 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆361Updated 3 years ago
- Everything you need about Burp Extension Generation☆156Updated 2 years ago