NoobieDog / Dir-Xcan
Python version of OWASP's DirBuster Application.
☆29Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for Dir-Xcan
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 7 years ago
- ☆11Updated 7 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- ☆47Updated 9 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- A Pythonic wrapper to MassDNS☆23Updated 6 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- ActionScript Proof of Concept to perform cross-domain reads☆16Updated 11 years ago
- Automated install process for Phishing Frenzy☆23Updated 9 years ago
- PHP tool to test XSS☆23Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- Windows Privesc Check☆20Updated 10 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 6 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago