Wmap ("Web Mapper") Information gathering for web hacking.
☆14Dec 3, 2014Updated 11 years ago
Alternatives and similar repositories for Wmap
Users that are interested in Wmap are comparing it to the libraries listed below
Sorting:
- The domain enumeration and scanning tool for hackers☆18Sep 29, 2024Updated last year
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- From SQL injection to root shell with CVE-2016-6662 by MaYaSeVeN☆29Jul 22, 2017Updated 8 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Splunk Web Shell☆51Mar 25, 2015Updated 10 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- Private CTF scripts☆12Aug 7, 2024Updated last year
- post-exploitation tools☆15Mar 27, 2018Updated 7 years ago
- Advance URL Fuzzing + Whois Domain running on python☆18Nov 8, 2022Updated 3 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- ☆17May 1, 2024Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆40Mar 16, 2017Updated 9 years ago
- DirBuster successor in Erlang☆37Feb 16, 2017Updated 9 years ago
- ☆15Nov 29, 2022Updated 3 years ago
- Open Source INTelligence☆24Apr 19, 2020Updated 5 years ago
- Stuff for the DEFCON 23 Car Hacking Village Badge☆10Sep 1, 2015Updated 10 years ago
- GoLismero web fingerprint population tool☆19Jul 30, 2013Updated 12 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- Intentionally Vulnerable Demo App: .NET MVC, WCF, WebAPI, Web Forms☆21Feb 10, 2024Updated 2 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are comp…☆17Jul 26, 2024Updated last year
- Protect servers against crypto attacks☆19Mar 30, 2023Updated 2 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 2 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- ☆86Aug 11, 2023Updated 2 years ago
- Image Encryption Algorithm - Digital Image Processing Research Work☆11Oct 4, 2016Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- ☆10Dec 21, 2024Updated last year
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Oct 7, 2019Updated 6 years ago
- ☆11Apr 18, 2018Updated 7 years ago
- WEB 跨域postMessage() 漏洞挖掘工具,基本原理:使用AJAX 获取页面代码,结合iframe 和data 协议构造测试环境,然后在iframe 下的window.onmessage 中插入hook 监控onmessage 的参数,最后通过能否被原来的onme…☆11Sep 13, 2016Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago