staaldraad / turner
SOCKS5 and HTTP over TURN/STUN proxy
☆178Updated last year
Alternatives and similar repositories for turner
Users that are interested in turner are comparing it to the libraries listed below
Sorting:
- A mini webserver with FTP support for XXE payloads☆332Updated last year
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆259Updated 3 years ago
- Exploitation toolkit for RichFaces☆103Updated last year
- An Out-of-Band XXE server for retrieving file contents over FTP.☆181Updated 4 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆267Updated 3 months ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆349Updated 2 years ago
- HTTP.ninja☆151Updated last year
- DupeKeyInjector☆135Updated 3 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆107Updated 4 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆259Updated 2 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆287Updated 4 months ago
- Scan Victim Backup Directories & Backup Files☆178Updated last year
- PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Or…☆96Updated 4 years ago
- Extension to log iframe and cross window communications.☆54Updated 2 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆598Updated 4 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆432Updated 2 years ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆361Updated 9 months ago
- DNS rebinding toolkit☆253Updated last year
- MOGWAI LABS JMX exploitation toolkit☆202Updated 2 years ago
- ☆174Updated 3 years ago
- CVE-2018-13379☆252Updated 5 years ago
- Everything you need about Burp Extension Generation☆154Updated 2 years ago
- ☆148Updated 3 years ago
- jolokia-exploitation-toolkit☆289Updated 4 months ago
- Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)☆169Updated 4 years ago
- ☆281Updated 3 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆220Updated 4 years ago
- Atlassian JIRA Template injection vulnerability RCE☆93Updated 5 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Pentest/BugBounty progress control with scanning modules☆281Updated 4 years ago