Liffy – Local File Inclusion Exploitation Tool
LFI Exploitation toolA little python tool to perform Local file inclusion.Liffy v2.0 is the improved version of liffy which was...
LFI Exploitation toolA little python tool to perform Local file inclusion.Liffy v2.0 is the improved version of liffy which was...
This blog was coauthored by Bria Grangard and Justin Buchanan.Every business is becoming a software business, and web applications are...
DLLPasswordFilterImplant is a custom password filter DLL that allows the capture of a user's credentials. Each password change event on...
ohmybackup - Scan Victim's Backup Directories & Backup FilesohmybackupScans backup folders on target sites. Searches archived files in the folders...
This project inspects Java libraries and classpaths for gadget chains. Gadgets chains are used to construct exploits for deserialization vulnerabilities....
It's an information security audit tool that creates intelligent wordlists based on the content of the target page.Help usSee some...
Simple way to disable/rename buttons from a task manager.Installationgit clone https://github.com/Mrakovic-ORG/TaskManager-Button-Disablercd TaskManager-Button-DisablerTaskManager Button Disablerdotnet buildFeaturesRename kill proccess buttonDisable kill proccess...
Linux Privilege Escalation through SUDO abuse.If you like the tool and for my personal motivation so as to develop other...
We are thrilled to announce that global research and consulting firm Frost & Sullivan has named Rapid7 as the Global...
AdamaSearches For Threat Hunting and Security AnalyticsA collection of known log and / or event data searches for threat hunting...
Intelligence Tool but without API keyWhat is Metabigor?Metabigor is Intelligence tool, its goal is to do OSINT tasks and more...
Rapid7 is thrilled to be recognized as a Leader in the 2020 Gartner Magic Quadrant for Security Information and Event...
When it comes to the data displayed in your security products, we understand that no two people want—or even need—the...
RApid Big IP DecoderWhat it isA CLI tool and library allowing to simply decode all kind of BigIP cookies.FeaturesSupport all...
Cross-site scripting labs for web application security enthusiastsList of Chall :~ Chall 1 | URL~ Chall 2 | Form~ Chall...
The RSA Conference 2020 is swiftly approaching, and we’re getting excited about the events we’ll be attending as we join...
Parse & filter the latest CVEs from https://cve.mitre.org. DocsUsagehttp://localhost:4000/cve?target=KEYWORDThe year parameter is optional.http://localhost:4000/cve?target=KEYWORD&year=YEARExampleshttp://localhost:4000/cve?target=ruby%20on%20railshttp://localhost:4000/cve?target=ruby%20on%20rails&year=2020If you want to parse the latest year,...
NekoBotV1 | Auto Exploiter With 500+ Exploit 2000+ ShellFeatures : Wordpress :1- Cherry-Plugin2- download-manager Plugin3- wysija-newsletters4- Slider Revolution 5- gravity-forms6-...
This post is part two of our blog series covering the recently released InsightVM Integration for ServiceNow CMDB application available...
GoSpider - Fast web spider written in GoInstallationgo get -u github.com/jaeles-project/gospiderFeaturesFast web crawlingBrute force and parse sitemap.xmlParse robots.txtGenerate and verify...
Uses CVE-2019-18988 to enumerate and decrypt TeamViewer credentials from Windows registry. Blogpost detailing the vulnerability: https://whynotsecurity.com/blog/teamviewer/Usage.DecryptTeamViewer.exeDownload DecryptTeamViewer Original Source
Dr.Semu runs executables in an isolated environment, monitors the behavior of a process, and based on Dr.Semu rules created by...
Syborg is a Recursive DNS Domain Enumerator which is neither active nor completely passive. This tool simply constructs a domain...
Manul is a coverage-guided parallel fuzzer for open-source and black-box binaries on Windows, Linux and macOS (beta) written in pure...