Chirantar7004 / -Web-Application-Vulnerability-Scanner-and-Threat-Analyzer
Research based Hybrid Scanner to detect various SQL, JavaScript and XSS vulnerabilities
☆15Updated 7 years ago
Related projects: ⓘ
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆24Updated 6 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆17Updated 5 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆13Updated 11 years ago
- webpwn3r ======== WebPwn3r - Web Applications Security Scanner. By Ebrahim Hegazy - @Zigoo0 Thanks: @lnxg33k, @dia2diab @Aelhemily, @o…☆25Updated 5 years ago
- OWASP Skanda - SSRF Exploitation Framework☆36Updated 11 years ago
- weak password generation☆12Updated 8 years ago
- Automated information gathering tool for pentest☆52Updated 8 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 6 years ago
- Advance URL Fuzzing + Whois Domain running on python☆17Updated last year
- This python script is developed to show, how many vulnerables websites, which are laying around on the web. 1) Scan net for urls prone to…☆54Updated 7 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 2 years ago
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Updated 7 years ago
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Updated 6 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆18Updated 5 years ago
- Web Information Gathering☆18Updated 9 years ago
- Simple Linux RootKit written in python☆10Updated 6 years ago
- Based on shawarkhanethicalhacker/BruteXSS☆13Updated 5 years ago
- ☆21Updated 5 years ago
- Burp Intruder File Payload Generator☆18Updated 4 years ago
- A few SQL and XSS attack tools☆38Updated 4 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 6 years ago
- ☆13Updated 5 years ago
- burp extender for fuzzing☆10Updated 6 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 2 years ago
- ☆11Updated 8 years ago
- ☆50Updated this week
- ☆18Updated 7 years ago
- scripts used in my pentest work.☆44Updated 8 years ago
- Webmin Remote Code Execution (authenticated)☆32Updated 5 years ago
- POC MS15-034☆33Updated 9 years ago