MrCl0wnLab / afdWordpress
Check arbitrary file download vulnerability in the WordPress
☆21Updated 4 years ago
Alternatives and similar repositories for afdWordpress:
Users that are interested in afdWordpress are comparing it to the libraries listed below
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.☆22Updated 4 years ago
- This is very basic automated recon script tool.☆19Updated 6 months ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆17Updated 3 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Exploit CVE-2020-13886 - LFI Intelbras TIP 200 / 200 LITE /☆10Updated 4 years ago
- Advanced Recon Tool☆26Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Steal Apache Solr instance Queries with or without a username and password.☆12Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- parse ffuf & map endpoints to wordlists☆20Updated 3 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Updated 9 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆13Updated 4 years ago
- Tool to find stored robots.txt files from the past☆18Updated last year
- Wordlist generator☆16Updated 4 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆18Updated 2 years ago
- Exploits for some of the vulnerabilities I have discovered☆18Updated 4 years ago
- Burp Extension to identify PII data☆21Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Pipe different tools with google dork Scanner☆55Updated 4 years ago
- Create subdomains and files wordlists from your browser history☆12Updated 2 years ago
- Tool to automatically email results from your Python scripts to your inbox as text or as a file attachment, storing the sender email acco…☆8Updated 5 years ago
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆15Updated last year
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- Web application recon for bug bounty☆22Updated 4 years ago
- Runs sshd as a unprivileged user for persistence☆12Updated 5 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆15Updated 6 years ago