A set of tools made to assist in penetration testing GWT applications. Additional details about these tools can be found on my OWASP Appsec DC slides available here: http://www.owasp.org/images/7/77/Attacking_Google_Web_Toolkit.ppt
☆238Jan 21, 2020Updated 6 years ago
Alternatives and similar repositories for GWT-Penetration-Testing-Toolset
Users that are interested in GWT-Penetration-Testing-Toolset are comparing it to the libraries listed below
Sorting:
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Jan 21, 2020Updated 6 years ago
- ☆101Nov 10, 2021Updated 4 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more☆168May 21, 2015Updated 10 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Duncan - Blind SQL injector skeleton☆60Jan 11, 2022Updated 4 years ago
- Growing list of potentially dangerous PHP functions☆52May 1, 2019Updated 6 years ago
- ☆20Jul 25, 2019Updated 6 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- UUID issues for Burp Suite☆53Jun 2, 2022Updated 3 years ago
- Penetration Testing tools - one repo to clone them all... containing latest pen testing tools☆541Nov 25, 2019Updated 6 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Study about HQL injection exploitation.☆51May 15, 2016Updated 9 years ago
- ☆252Sep 18, 2019Updated 6 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227May 8, 2018Updated 7 years ago
- Learning Penetration Testing of Android Applications☆80Aug 5, 2017Updated 8 years ago
- ☆23Apr 8, 2015Updated 10 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- ☆231Nov 18, 2015Updated 10 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- ☆16May 9, 2016Updated 9 years ago