tarunkant / GopherusLinks
This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
☆3,292Updated 2 years ago
Alternatives and similar repositories for Gopherus
Users that are interested in Gopherus are comparing it to the libraries listed below
Sorting:
- Automatic SSRF fuzzer and exploitation tool☆3,478Updated 5 months ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,113Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,481Updated last year
- HackBar plugin for Burpsuite☆1,616Updated 4 years ago
- Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.☆1,718Updated last month
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,729Updated 4 months ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,704Updated last year
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,620Updated 2 years ago
- Pwn stuff.☆1,806Updated 3 years ago
- A .DS_Store file disclosure exploit. It parses .DS_Store file and downloads files recursively.☆1,713Updated 2 years ago
- 🕷️ A `.git` folder exploiting tool that is able to restore the entire Git repository, including stash, common branches and common tags.☆1,605Updated 3 months ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,505Updated 6 years ago
- Rip web accessible (distributed) version control systems: SVN/GIT/HG...☆1,777Updated last year
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,239Updated last month
- The cheat sheet about Java Deserialization vulnerabilities☆3,164Updated 2 years ago
- Burpsuite Extension to bypass 403 restricted directory☆1,664Updated 2 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆1,390Updated 4 years ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆3,302Updated last month
- Next-Generation Linux Kernel Exploit Suggester☆1,960Updated 3 years ago
- Deserialization payload generator for a variety of .NET formatters☆3,661Updated last year
- Dirty Cow exploit - CVE-2016-5195☆919Updated 6 months ago
- A python script that finds endpoints in JavaScript files☆4,274Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,908Updated 3 years ago
- Webshell && Backdoor Collection☆1,984Updated 5 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,151Updated 11 months ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆6,148Updated last week
- 🎯 Fast CORS misconfiguration vulnerabilities scanner☆1,138Updated 4 years ago
- Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs☆888Updated 8 months ago
- pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.☆3,830Updated 11 months ago
- ☆984Updated 3 years ago