Josue87 / BoomER
Framework for exploiting local vulnerabilities
☆83Updated last year
Alternatives and similar repositories for BoomER:
Users that are interested in BoomER are comparing it to the libraries listed below
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆68Updated last year
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago
- Automated Tools Pentest☆7Updated last year
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆64Updated 4 years ago
- EternalView is an all in one basic information gathering and vulnerability assessment tool☆135Updated 4 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- SuperNES - Super Nmap Easy Scanner☆10Updated 6 years ago
- Automate Metasploit scanning and exploitation☆113Updated 3 months ago
- Enumerate a target Based off of Nmap Results☆77Updated last year
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- A tool to generate media files with malicious metadata☆124Updated 5 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated last year
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- A tool written in python for scraping firebase data☆42Updated 4 years ago
- Simple Karma Attack☆66Updated 4 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 7 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆56Updated 10 months ago