vp777 / procrustes
A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering
☆210Updated 4 years ago
Alternatives and similar repositories for procrustes:
Users that are interested in procrustes are comparing it to the libraries listed below
- Burp with Friends☆102Updated 2 years ago
- ☆148Updated 3 years ago
- Linux privilege escalation via LXD☆133Updated 5 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 3 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆221Updated 4 years ago
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆267Updated 2 months ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- SNIcat☆126Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 3 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆256Updated 2 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆203Updated 4 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated 2 years ago
- Everything you need about Burp Extension Generation☆152Updated 2 years ago
- One stop place for exploiting Jira instances in your proximity☆187Updated 10 months ago
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Parse NTLM challenge messages over HTTP and SMB☆144Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆231Updated last year
- ☆150Updated last year
- A simple remote scanner for Atlassian Jira☆120Updated 2 years ago
- DupeKeyInjector☆135Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆480Updated 9 months ago
- Words list generator to crack security tokens☆110Updated 4 years ago
- automated password spraying tool☆147Updated 3 years ago