AonCyberLabs / PadBusterLinks
Automated script for performing Padding Oracle attacks
☆793Updated last year
Alternatives and similar repositories for PadBuster
Users that are interested in PadBuster are comparing it to the libraries listed below
Sorting:
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,022Updated 4 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆561Updated 3 years ago
- Debian OpenSSL Predictable PRNG (CVE-2008-0166)☆401Updated 2 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,107Updated 9 months ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,081Updated 2 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆548Updated 5 years ago
- Herramienta para evadir disable_functions y open_basedir☆450Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆566Updated last year
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆554Updated 3 years ago
- Finds unknown classes of injection vulnerabilities☆703Updated 4 months ago
- ☆265Updated 6 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,669Updated 9 months ago
- Contents for Node.Js Security Course☆343Updated 4 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆887Updated 5 years ago
- Python PTY backdoors - full PTY or nothing!☆751Updated 11 years ago
- XPath injection tool☆390Updated 2 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆258Updated last year
- Search for Directory Traversal Vulnerabilities☆455Updated 2 months ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆729Updated 6 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆720Updated 6 years ago
- ☆1,167Updated 8 years ago
- Simple DNS Rebinding Service☆687Updated 5 years ago
- Vulnerability scanner based on vulners.com search API☆870Updated last month
- A DNS rebinding attack framework.☆1,185Updated 2 months ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆977Updated 7 years ago
- Crack the shared secret of a HS256-signed JWT☆249Updated last year
- A Burp Suite Pro extension which augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by caus…☆436Updated 5 months ago
- ☆640Updated 11 months ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆424Updated 5 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,861Updated 3 years ago