Disrupt WAF by abusing SSL/TLS Ciphers
☆48Dec 19, 2018Updated 7 years ago
Alternatives and similar repositories for WAF_buster
Users that are interested in WAF_buster are comparing it to the libraries listed below
Sorting:
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- ☆128May 22, 2023Updated 2 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- ☆25May 9, 2021Updated 4 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- WPHunter A Wordpress Vulnerability Scanner☆168Mar 23, 2018Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- This repository contains the POC of an exploit for node-jose < 0.11.0☆25Feb 24, 2023Updated 3 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- ☆14Apr 25, 2019Updated 6 years ago
- HashCobra Hash Cracking tool.☆122Dec 1, 2020Updated 5 years ago
- wordpress hash cracker .☆66Sep 7, 2021Updated 4 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)☆16Aug 29, 2018Updated 7 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 6 months ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆49Feb 8, 2020Updated 6 years ago