Chirantar7004 / -Web-Application-Vulnerability-Scanner-and-Threat-Analyzer
Research based Hybrid Scanner to detect various SQL, JavaScript and XSS vulnerabilities
☆16Updated 7 years ago
Alternatives and similar repositories for -Web-Application-Vulnerability-Scanner-and-Threat-Analyzer:
Users that are interested in -Web-Application-Vulnerability-Scanner-and-Threat-Analyzer are comparing it to the libraries listed below
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆24Updated 7 years ago
- Advance URL Fuzzing + Whois Domain running on python☆17Updated 2 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆13Updated 11 years ago
- webpwn3r ======== WebPwn3r - Web Applications Security Scanner. By Ebrahim Hegazy - @Zigoo0 Thanks: @lnxg33k, @dia2diab @Aelhemily, @o…☆26Updated 6 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 11 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆17Updated 6 years ago
- This python script is developed to show, how many vulnerables websites, which are laying around on the web. 1) Scan net for urls prone to…☆54Updated 8 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 6 years ago
- ☆21Updated 6 years ago
- Automated information gathering tool for pentest☆54Updated 8 years ago
- A few SQL and XSS attack tools☆40Updated 5 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 3 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 10 months ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 2 years ago
- My Payload Collection (XSS,SQL ...)☆13Updated 6 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- burp extender for fuzzing☆10Updated 6 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 6 years ago
- ☆19Updated 7 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17Updated 5 years ago
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- ☆27Updated 6 years ago
- Struts2 S2-045-Nmap NSE script☆50Updated 8 years ago
- An tool for search IOT MQTT vulnerable with shodan☆19Updated 7 years ago
- ☆47Updated 9 years ago
- This is a Firefox WebExtension that monitors the browsing activity and automatically perform an automated XSS vulnerability scan by submi…☆19Updated 8 years ago
- Burp Intruder File Payload Generator☆18Updated 5 years ago