A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.
☆32Dec 7, 2010Updated 15 years ago
Alternatives and similar repositories for deface
Users that are interested in deface are comparing it to the libraries listed below
Sorting:
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- TCP session interception and injection framework☆55Mar 22, 2011Updated 14 years ago
- A JBoss script for obtaining remote shell access☆177Aug 7, 2020Updated 5 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Jan 29, 2018Updated 8 years ago
- ModSecurity status☆33May 27, 2014Updated 11 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- HoneySAP: SAP Low-interaction research honeypot☆51May 1, 2023Updated 2 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Ruby bindings for the yara file analysis and classification library☆27Aug 26, 2011Updated 14 years ago
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆13Sep 29, 2021Updated 4 years ago
- ☆17Sep 9, 2022Updated 3 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago
- Local File Inclusion Scanner and Exploiter☆15Dec 28, 2021Updated 4 years ago
- WHY?☆18Sep 4, 2016Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- ☆57Aug 7, 2020Updated 5 years ago
- XMLRPC server for password cracking☆33Jan 20, 2015Updated 11 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Perl/Python modules for interfacing with Metasploit MSGRPC☆96Aug 7, 2020Updated 5 years ago
- ☆31Jun 30, 2013Updated 12 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Sep 14, 2021Updated 4 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- Simple REST-style web service for the CVE searching☆97May 19, 2023Updated 2 years ago
- Script to find exploitable magic methods for PHP object injection☆27Dec 4, 2014Updated 11 years ago