A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat
☆45Aug 9, 2013Updated 12 years ago
Alternatives and similar repositories for UPnP-request-generator
Users that are interested in UPnP-request-generator are comparing it to the libraries listed below
Sorting:
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆32Dec 7, 2010Updated 15 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Apr 12, 2015Updated 10 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Jan 29, 2018Updated 8 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66May 16, 2024Updated last year
- Net::TNS, a Ruby library for connecting to Oracle databases.☆35May 7, 2019Updated 6 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- The ModSecurity Pcap Connector☆27Jan 13, 2016Updated 10 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- XXE OOB Exploitation Toolset for Automation☆63Jan 20, 2014Updated 12 years ago
- Automatic VLAN configuration tool for Linux☆25Jan 24, 2019Updated 7 years ago
- Advanced virtual host bruteforcer☆31Nov 23, 2015Updated 10 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- A JBoss script for obtaining remote shell access☆177Aug 7, 2020Updated 5 years ago
- Fire and forget password cracking and complexity analysis.☆35Jan 4, 2016Updated 10 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Ruby bindings for the yara file analysis and classification library☆27Aug 26, 2011Updated 14 years ago
- ☆16Jul 10, 2020Updated 5 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- ☆17Sep 9, 2022Updated 3 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆17Feb 25, 2025Updated last year
- TCP session interception and injection framework☆55Mar 22, 2011Updated 14 years ago
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago