A lightweight CSRF Toolkit for easy Proof of concept
☆172Jun 11, 2014Updated 11 years ago
Alternatives and similar repositories for CSRFT
Users that are interested in CSRFT are comparing it to the libraries listed below
Sorting:
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆163Jan 21, 2021Updated 5 years ago
- SPIP (CMS) Scanner for penetration testing purpose written in Python☆73Aug 29, 2014Updated 11 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆14Mar 4, 2017Updated 9 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- Client/server scripts designed to test outbound (egress) firewall rules.☆37Sep 9, 2013Updated 12 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆81Jul 21, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Feb 18, 2020Updated 6 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated last month
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Apr 20, 2020Updated 5 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- Subdomain Analyzer☆77Apr 18, 2017Updated 8 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Guides for locking down a computer☆12Mar 4, 2023Updated 3 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Some tools to automate recon - 003random☆294Jun 5, 2018Updated 7 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago