Python tool for expired domain discovery in crossdomain.xml files
☆23Feb 21, 2017Updated 9 years ago
Alternatives and similar repositories for crossdomainscanner
Users that are interested in crossdomainscanner are comparing it to the libraries listed below
Sorting:
- ☆20Oct 7, 2013Updated 12 years ago
- cpufuzz is a dumb, simple and portable CPU fuzzer☆11Jan 27, 2019Updated 7 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated last month
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- Packet Batch's old DPDK program. An application that utilizes the DPDK to send network packets. Used for penetration testing including De…☆16Apr 20, 2024Updated last year
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 8 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆41Jul 1, 2019Updated 6 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Mar 31, 2017Updated 8 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- A set of infrastructure-as-code examples to help those getting started with DevOps tools☆17Sep 26, 2024Updated last year
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 8 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 4 years ago
- 一个Fuzzing服务器端模板注入漏洞的半自动化工具☆15Aug 4, 2016Updated 9 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- A quick and dirty way to bypass encrypted EPA to connect to a NetScaler Gateway☆20Oct 11, 2019Updated 6 years ago
- A Python script for extracting encoded text from PNG images☆17Oct 28, 2021Updated 4 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Jul 6, 2021Updated 4 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 8 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago