Disrupt WAF by abusing SSL/TLS Ciphers
☆48Dec 19, 2018Updated 7 years ago
Alternatives and similar repositories for WAF_buster
Users that are interested in WAF_buster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- ☆128May 22, 2023Updated 2 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- ☆25May 9, 2021Updated 4 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- cve-2019-0604 SharePoint RCE exploit☆40Jun 26, 2019Updated 6 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- A fake JDBC driver that allows OS command execution.☆125Oct 2, 2022Updated 3 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- ☆14Apr 25, 2019Updated 6 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- ☆17Oct 25, 2018Updated 7 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 6 years ago
- WPHunter A Wordpress Vulnerability Scanner☆168Mar 23, 2018Updated 8 years ago
- ☆63Mar 21, 2018Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- This repository contains the POC of an exploit for node-jose < 0.11.0☆25Feb 24, 2023Updated 3 years ago
- Tool for CVE-2018-16323☆82Jan 17, 2019Updated 7 years ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆98Aug 13, 2022Updated 3 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Sep 18, 2018Updated 7 years ago