Shashank-In / VulEdiWi
A tool to find all the publicly editable wiki of an organisation and publish your demo page on it
☆9Updated 5 years ago
Alternatives and similar repositories for VulEdiWi:
Users that are interested in VulEdiWi are comparing it to the libraries listed below
- automatic scan for hackthebox☆14Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Take a list of URIs and print all the of the paths☆10Updated 4 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Updated 6 years ago
- ☆20Updated 5 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆39Updated 3 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- parsers to make life easier☆12Updated 4 years ago
- UglyEXe - bypass some AVs☆16Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Security Advisories☆11Updated 5 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 4 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated last year
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- ☆15Updated 3 years ago
- My python3 implementation of a Forward Shell☆35Updated 6 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago