Bosco-Lam / BruteXssView external linksLinks
Based on shawarkhanethicalhacker/BruteXSS
☆15Jan 24, 2019Updated 7 years ago
Alternatives and similar repositories for BruteXss
Users that are interested in BruteXss are comparing it to the libraries listed below
Sorting:
- ☆15Jan 6, 2025Updated last year
- ☆24Oct 31, 2023Updated 2 years ago
- CVE-2019-3799 - Spring Cloud Config Server: Directory Traversal < 2.1.2, 2.0.4, 1.4.6☆31Apr 18, 2019Updated 6 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- ☆15Mar 3, 2021Updated 4 years ago
- ☆11Jul 10, 2024Updated last year
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 3 weeks ago
- ☆11Jul 18, 2022Updated 3 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Grepable cheat sheets for pentesting. Each sheet one tool.☆11Oct 15, 2020Updated 5 years ago
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- Security technique research and some funny work on it !☆12Dec 18, 2018Updated 7 years ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- ☆13Dec 28, 2024Updated last year
- 本文是一份针对想要学习Chrome浏览器插件开发的开发者的详尽指南。从Chrome插件的基本概念和架构开始,到实际的插件开发流程和常见问题的解决方案,本文将提供全面的教程和实践经验,帮助读者快速掌握Chrome插件开发的技能,并构建出功能丰富、高效实用的插件。☆11Apr 19, 2024Updated last year
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 9 years ago
- Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133☆10Mar 15, 2019Updated 6 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- A simple file encryption library☆18May 24, 2017Updated 8 years ago
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆24Sep 28, 2025Updated 4 months ago
- 数独的生成算法和解题算法☆11Jun 9, 2018Updated 7 years ago
- A simple script to detect unescaped characters in a web application for e.g. Cross Site Scripting (XSS) attacks.☆10Aug 20, 2020Updated 5 years ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆11Jun 24, 2020Updated 5 years ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- web(ctf)方面任务练习区域☆10May 22, 2019Updated 6 years ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆12Dec 11, 2020Updated 5 years ago
- Reworked Adafruit's source code to run under Linux then wrapped it as a python extension module.☆11Mar 11, 2016Updated 9 years ago
- IT Security tools☆12Nov 12, 2021Updated 4 years ago
- Bithoven is a smart contract language for composing powerful and secure instruments on Bitcoin. LR(1) parser with static analysis for com…☆41Updated this week