zaf / sipshockLinks
A scanner for SIP proxies vulnerable to Shellshock
☆112Updated 9 years ago
Alternatives and similar repositories for sipshock
Users that are interested in sipshock are comparing it to the libraries listed below
Sorting:
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 10 years ago
- ☆16Updated 10 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Updated 12 years ago
- YAPDNS☆39Updated 10 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Updated 6 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 10 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Tool for scanning Cisco router products over SSH☆55Updated 11 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- Projects and POCs☆61Updated 11 years ago
- Some helper tools for network pentest☆20Updated 12 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- ☆20Updated last year
- ☆25Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- REST/JSON interface to Burp Suite☆33Updated 5 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago