websecnl / MagicByteSelectorLinks
Burp Suite Extension for inserting a magic byte into responder's request
☆24Updated 2 years ago
Alternatives and similar repositories for MagicByteSelector
Users that are interested in MagicByteSelector are comparing it to the libraries listed below
Sorting:
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Scripts that automate portions of pentests.☆53Updated 2 months ago
- A Moodle Scanner☆43Updated 11 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆59Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆26Updated 11 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Azure Service Subdomain Enumeration☆67Updated last year
- Recon scripts for Red Team and Web blackbox auditing☆26Updated 3 weeks ago
- ☆27Updated 2 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Updated 8 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- ☆55Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆70Updated last week
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆36Updated 6 months ago
- Vast.ai Password Kracking☆87Updated 4 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- ☆15Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- Exploits Unauth Docker API☆41Updated 6 months ago
- Tools used for Pentesting☆21Updated 2 years ago
- ☆95Updated 8 months ago
- ☆91Updated 2 years ago
- A small red team course☆39Updated 2 years ago
- ☆92Updated this week
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆48Updated 3 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 11 months ago