A python module that accepts an HTTP request file and returns a dictionary of headers and post data
☆43Oct 30, 2019Updated 6 years ago
Alternatives and similar repositories for Burpee
Users that are interested in Burpee are comparing it to the libraries listed below
Sorting:
- NST Vulnerability Scanner☆18Jan 30, 2019Updated 7 years ago
- A ping detection tool for linux☆24Apr 20, 2020Updated 5 years ago
- Taking another crack at OS dev...☆11Jun 12, 2022Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- https://jira.atlassian.com/browse/JRASERVER-69793☆10Sep 16, 2019Updated 6 years ago
- SIP-Based DDoS Defense Tool☆15Sep 6, 2018Updated 7 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- Web Information Gathering☆18Feb 23, 2015Updated 11 years ago
- ☆27Oct 28, 2019Updated 6 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆12Dec 27, 2018Updated 7 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- A curated collection of some cool Penetration scripts.☆14Feb 25, 2021Updated 5 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Text messages (SMS) for two-factor authentication, generating all possible/likely codes☆15Aug 4, 2019Updated 6 years ago
- ☆16Feb 25, 2022Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 5 years ago
- An tool for search IOT MQTT vulnerable with shodan☆20Sep 15, 2017Updated 8 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Python wireless library for Linux.☆44Jun 16, 2022Updated 3 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Small Project :)☆18Oct 27, 2019Updated 6 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- Talos Decryptor POC for Remcos RAT version 2.0.5 and earlier☆24Aug 2, 2018Updated 7 years ago
- CVE-2018-6574 POC : golang 'go get' remote command execution during source code build☆24Jan 14, 2022Updated 4 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Simple Client-Server Chat Application using Python Sockets☆19Feb 21, 2018Updated 8 years ago