Automatic remote/local file inclusion vulnerability analysis and exploit tool
☆60May 8, 2019Updated 6 years ago
Alternatives and similar repositories for CrabStick
Users that are interested in CrabStick are comparing it to the libraries listed below
Sorting:
- LFI (Local File Inclusion) Exploitation Tool☆17Jan 4, 2021Updated 5 years ago
- A simple Script which tests for LFI (Local File Inclusion) via Curl☆15Mar 11, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/lfimap☆16Mar 5, 2016Updated 9 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆272Mar 24, 2021Updated 4 years ago
- S3 Buckets that will let you list all files inside them☆14Apr 26, 2018Updated 7 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- Local file inclusion exploitation tool☆929Oct 1, 2025Updated 5 months ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Dec 20, 2017Updated 8 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆17Aug 24, 2025Updated 6 months ago
- A collection of Burp Suite extensions☆30Jun 16, 2016Updated 9 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- MassBleed SSL Vulnerability Scanner☆245Apr 18, 2020Updated 5 years ago
- ☆13May 8, 2019Updated 6 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- A list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of hosting and mana…☆12Mar 29, 2020Updated 5 years ago