Extract uncompiled, uncompressed SPA code from Webpack source maps.
-
Updated
Apr 16, 2022 - Python
Extract uncompiled, uncompressed SPA code from Webpack source maps.
Utility to download and extract document metadata from an organization. This technique can be used to identify: domains, usernames, software/version numbers and naming conventions.
Here you can get full exploit for SAP NetWeaver AS JAVA
Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)
POC - CVE-2024–24919 - Check Point Security Gateways
Hacking the RDP protocol - Sending an incomplete CredSSP (NTLM) authentication request with null credentials will cause the remote service to respond with a NTLMSSP message disclosing information to include NetBIOS, DNS, and OS build version.
Exploit Code, notes, and resources to accompany PortSwiggers' WebAcademy Labs.
A PoC exploit for CVE-2021-43798 - Grafana Directory Traversal
Quick DNS Zone Transfer
WordPress WPS Hide Login <1.9.1 - Information Disclosure
Extract uncompiled, uncompressed SPA code from Webpack source maps.
Check Point Security Gateway (LFI)
A script that automates the process of Information disclosure files of a target website.
A simple tool for finding information disclosure vulnerabilities.
EventON (Free < 2.2.8, Premium < 4.5.5) - Information Disclosure
A tool for scanning websites to find exposed .git directories, helping to detect potential security risks related to misconfigured repositories.
SOUND4 Impact/Pulse/First/Eco <=2.x - Information Disclosure
Add a description, image, and links to the information-disclosure topic page so that developers can more easily learn about it.
To associate your repository with the information-disclosure topic, visit your repo's landing page and select "manage topics."