P0cL4bs / kadimusLinks
kadimus is a tool to check and exploit lfi vulnerability.
☆554Updated 5 years ago
Alternatives and similar repositories for kadimus
Users that are interested in kadimus are comparing it to the libraries listed below
Sorting:
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- JShell - Get a JavaScript shell with XSS.☆528Updated 6 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆561Updated 3 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆442Updated last year
- A unique automated LFi Exploiter with Bind/Reverse Shells☆297Updated 10 years ago
- Search for Directory Traversal Vulnerabilities☆456Updated 4 months ago
- Exploitation for XSS☆727Updated 4 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆335Updated 4 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆734Updated 6 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆572Updated 3 years ago
- BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application. This tool was originally developed by Shawar …☆555Updated 4 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆569Updated last year
- A tool to find and exploit servers vulnerable to Shellshock☆329Updated 2 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆977Updated 7 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891Updated 5 years ago
- Drupal enumeration & exploitation tool☆608Updated 5 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆403Updated last week
- SQL Injection Exploitation Tool☆797Updated 6 years ago
- Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)☆591Updated 4 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆236Updated 5 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆317Updated 5 months ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Updated 5 years ago
- Multi Tool Subdomain Enumeration☆725Updated 4 years ago
- Vulnerability scanner based on vulners.com search API☆875Updated 2 months ago
- ☆643Updated last year
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆632Updated 6 years ago
- Network reconnaissance and vulnerability assessment tools.☆401Updated 3 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆359Updated 8 months ago
- A Burp Suite Pro extension which augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by caus…☆438Updated 7 months ago
- simple script to extract all web resources by means of .SVN folder exposed over network.☆480Updated last year