A configurable XPath/XML injection testbed
☆33Jul 19, 2013Updated 12 years ago
Alternatives and similar repositories for XMLmao
Users that are interested in XMLmao are comparing it to the libraries listed below
Sorting:
- A configurable SQL injection test-bed☆123Jul 19, 2013Updated 12 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆32Dec 7, 2010Updated 15 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Jan 29, 2018Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- ModSecurity status☆33May 27, 2014Updated 11 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- Net::TNS, a Ruby library for connecting to Oracle databases.☆35May 7, 2019Updated 6 years ago
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- Ruby bindings for the yara file analysis and classification library☆27Aug 26, 2011Updated 14 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- IDA Pro loader module for Infineon/Intel-based iPhone baseband firmwares☆25Apr 19, 2012Updated 13 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 10 years ago
- Fault injection library☆22Dec 2, 2014Updated 11 years ago
- ☆17Sep 9, 2022Updated 3 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago
- A JBoss script for obtaining remote shell access☆177Aug 7, 2020Updated 5 years ago