watchtowrlabs / watchTowr-vs-Fortiweb-AuthBypassLinks
☆74Updated 2 months ago
Alternatives and similar repositories for watchTowr-vs-Fortiweb-AuthBypass
Users that are interested in watchTowr-vs-Fortiweb-AuthBypass are comparing it to the libraries listed below
Sorting:
- Search for all leaked keys/secrets using one regex! bugbounty☆183Updated 10 months ago
- SharePoint WebPart Injection Exploit Tool☆311Updated 2 months ago
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆125Updated last year
- Just A list Of Some Multilingual XSS Payloads and other weird ones i made☆123Updated 4 months ago
- Everything and anything related to password spraying☆151Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆121Updated last year
- ☆75Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆117Updated this week
- A list of all Active Directory machines from HackTheBox☆212Updated last week
- Enhance Your Active Directory Password Spraying with User Intelligence.☆311Updated last month
- Exploitation of CVE-2026-24061☆184Updated 2 weeks ago
- ☆173Updated 5 months ago
- Docker Remote API Scanner and Exploit☆180Updated 2 years ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆108Updated 5 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆221Updated 9 months ago
- CVE-2025-49144 PoC for security researchers to test and try.☆85Updated 7 months ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆183Updated 10 months ago
- ☆238Updated 10 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Updated last year
- ☆95Updated 10 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago
- ☆59Updated 2 years ago
- GeoServer Remote Code Execution☆86Updated 9 months ago
- Rust-powered HTTP Request Smuggling Scanner.☆98Updated last week
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆132Updated last month
- ☆59Updated 9 months ago