☆22Dec 23, 2021Updated 4 years ago
Alternatives and similar repositories for example-intruder-payloads
Users that are interested in example-intruder-payloads are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CRLF Detection based on @BlackFan 's work See link below☆16Mar 14, 2024Updated 2 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Feb 4, 2022Updated 4 years ago
- SQLI labs to test error based, Blind boolean based, Time based.☆17Feb 1, 2019Updated 7 years ago
- ☆16Dec 23, 2021Updated 4 years ago
- ☆17Mar 16, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆21Mar 11, 2026Updated 2 weeks ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆34Mar 20, 2026Updated last week
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Burp Extensions Api☆198Feb 11, 2026Updated last month
- ☆11Dec 22, 2023Updated 2 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- php之md5类型靶场☆10Feb 6, 2021Updated 5 years ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- Causal impact of current events on Wikipedia page views.☆10Dec 2, 2016Updated 9 years ago
- A new framework, collaborative cascade prediction based on graph neural networks (CCasGNN) to jointly utilize the structural characterist…☆10Dec 8, 2021Updated 4 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- MCP server for RabbitMQ☆25Oct 14, 2025Updated 5 months ago
- Implementation of Wappalyzer in Python☆55Dec 8, 2022Updated 3 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- trakttv everywhere☆27Mar 31, 2013Updated 12 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago
- ZZCMS v8.2-重装GETSHELL工具☆11May 8, 2018Updated 7 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- malloc for memory-mapped files☆14Jun 25, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Example of how to embed Nimscript in your Nim application☆19Mar 2, 2018Updated 8 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- ℹ️ Cross-platform browser extension for discovering security.txt and humans.txt files.☆22Jul 12, 2023Updated 2 years ago
- The Python interface for YARA http://virustotal.github.io/yara/☆20Jul 13, 2017Updated 8 years ago
- 招聘小程序,高校微信开发大赛☆10Jul 3, 2022Updated 3 years ago
- ☆16May 15, 2020Updated 5 years ago