OWASP / WebSpa
A Java web knocking tool for sending a single HTTP/S request to your web server in order to authorise the execution of a premeditated Operating System (O/S) command.
☆16Updated 9 years ago
Alternatives and similar repositories for WebSpa:
Users that are interested in WebSpa are comparing it to the libraries listed below
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- ☆13Updated 7 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Repository for OWASP Code Review document☆16Updated 10 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- MSF database code, gemified☆52Updated 3 weeks ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 9 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- A web app scanner☆26Updated 11 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Network Guardian☆12Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Virtual host brute forcer