0xNinjaCyclone / WRockLinks
A multi web security purposes tool
☆39Updated 2 months ago
Alternatives and similar repositories for WRock
Users that are interested in WRock are comparing it to the libraries listed below
Sorting:
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 11 months ago
- Vulnerabilities you my miss during a penetration testing.☆99Updated last year
- ☆48Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆28Updated 7 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 7 months ago
- Web Hacking and Red Teaming MindMap☆74Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- ☆43Updated 2 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆125Updated 10 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆72Updated 5 months ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated 2 weeks ago
- Red Teaming tools and techniques☆53Updated 2 years ago
- ☆46Updated 4 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆57Updated 3 years ago
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆64Updated 5 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆65Updated last year
- Collection of my talks and workshops about hacking & cybersecurity☆28Updated 4 months ago
- Automated Subdomain Enumeration and Scanning Tool☆114Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- an exploit of Server-side request forgery (SSRF)☆50Updated 11 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year