• Stars
    star
    16
  • Rank 1,310,202 (Top 26 %)
  • Language
    Python
  • Created about 3 years ago
  • Updated over 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Automated Recon Tool Installer

More Repositories

1

universal-bypass

This Tool bypass 403/401. This script contain all the possible techniques to do the bypass
Python
42
star
2

idb-shodan

Fast IP Lookups for Open Ports and Vulnerabilities from API internetdb shodan
Python
15
star
3

CVE-2021-40870

Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file which allows an unauthenticated user to execute arbitrary code via directory traversal
Python
15
star
4

google-junk

A script to search for URLs according the dork and collect form cetain page testing for vulnerabilities
Python
6
star
5

exploit-shodan

Exploit Shodan is the CVE info finder . Simple CVE find in shodan exploit domain.
Python
2
star
6

subscribe-for-more

2
star
7

CVE-mon

CVEmon can show you the daily/weekly popular cves in terminal with desription and severity
Python
1
star
8

spring4shell

Python
1
star
9

CVE-2022-29464

Python
1
star
10

CVE-2019-18935-checker

Python
1
star
11

Reflex-Arbitrary-File-Upload

Python
1
star
12

HTB-Scripts

Python
1
star
13

CVE-2022-26134

Python
1
star
14

CVE-2022-1388

Python
1
star
15

github-dorker

Python
1
star
16

mass-telrik

Python
1
star
17

gdork-online

Python
1
star
18

acqufin

Python
1
star
19

Reconau

Python
1
star
20

Arbitrary-File-Upload-ZoomSounds

ZoomSounds < 6.05 allowing unauthenticated users to upload an arbitrary file anywhere on the web server.
Python
1
star
21

grafana_lfi

Grafana has a public API endpoint, /public/plugins/:pluginId, which allows you to view a plugin's assets. This works by providing a valid :pluginId and then specifying the file path, such as img/logo.png. However, Grafana fails to sanitize the user provided file path, leading to path traversal.
Python
1
star