A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.
☆32Dec 7, 2010Updated 15 years ago
Alternatives and similar repositories for deface
Users that are interested in deface are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- A JBoss script for obtaining remote shell access☆177Aug 7, 2020Updated 5 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- TCP session interception and injection framework☆55Mar 22, 2011Updated 15 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- ☆31Jun 30, 2013Updated 12 years ago
- ☆57Aug 7, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- ☆14Sep 10, 2019Updated 6 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Jan 29, 2018Updated 8 years ago
- Script to find exploitable magic methods for PHP object injection☆27Dec 4, 2014Updated 11 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 2 months ago
- ModSecurity status☆33May 27, 2014Updated 11 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- A simple fruitninja clone built in Processing to interface with the Leap Motion Controller☆29Mar 11, 2013Updated 13 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago
- Blockfinder enumerates network information for countries☆130Jan 29, 2023Updated 3 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- Get version headers from a list of websites☆12Oct 1, 2020Updated 5 years ago
- Net::TNS, a Ruby library for connecting to Oracle databases.☆35May 7, 2019Updated 6 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- A Raspberry Pi pipeline viewer☆12Mar 26, 2015Updated 11 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- Simple PHP file manager for SMB Windows networks☆12May 1, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- LIttle script for collect non-SNMP data from Ubiquiti airOS devices☆11Sep 15, 2013Updated 12 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58May 1, 2015Updated 10 years ago
- A simple hack to use a leap motion device to control a 3D object in an Android application☆25May 26, 2013Updated 12 years ago
- Ruby bindings for the yara file analysis and classification library☆27Aug 26, 2011Updated 14 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago