WebBorer is a directory-enumeration tool written in Go.
☆44Mar 7, 2023Updated 3 years ago
Alternatives and similar repositories for webborer
Users that are interested in webborer are comparing it to the libraries listed below
Sorting:
- ☆13Aug 18, 2016Updated 9 years ago
- Scoreboard for CTF Competitions☆27Jul 19, 2016Updated 9 years ago
- Scanner for document roots/URLs.☆14Nov 17, 2011Updated 14 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- This is my path to OSCP☆11Jun 16, 2018Updated 7 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Jun 7, 2014Updated 11 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- An intercepting proxy, based on Netty☆19Sep 14, 2017Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Toolset for detecting reflected xss in websites☆116Oct 7, 2018Updated 7 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Burp Suite plugin for binary search on HTTP parameters☆17Oct 31, 2017Updated 8 years ago
- ☆18Nov 6, 2016Updated 9 years ago
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21May 11, 2017Updated 8 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Example steps to run Prometheus in Kubernetes and scrape the infrastructure and apps☆12Nov 4, 2016Updated 9 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48May 1, 2022Updated 3 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Study about HQL injection exploitation.☆52May 15, 2016Updated 9 years ago
- ☆22Jan 26, 2015Updated 11 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago