OWASP / WebSpaLinks
A Java web knocking tool for sending a single HTTP/S request to your web server in order to authorise the execution of a premeditated Operating System (O/S) command.
☆16Updated 10 years ago
Alternatives and similar repositories for WebSpa
Users that are interested in WebSpa are comparing it to the libraries listed below
Sorting:
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- ☆78Updated 5 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 9 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 11 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 11 years ago
- A web app scanner☆26Updated 11 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated 10 months ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 4 years ago
- Scanner for document roots/URLs.☆14Updated 13 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Set of Python scripts to perform SecRules language evaluation on a given http request.☆14Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- MSF database code, gemified☆52Updated last month
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- ☆15Updated 8 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Updated 12 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Lightweight and extensible horizontal vulnerability scanner☆11Updated 2 years ago