THSamurai / WrapSQLMAPLinks
☆13Updated 6 years ago
Alternatives and similar repositories for WrapSQLMAP
Users that are interested in WrapSQLMAP are comparing it to the libraries listed below
Sorting:
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 5 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last year
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- Magento Security Scanner☆15Updated 3 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Updated 5 years ago
- a parser + crawler for .DS_Store files exposed publically☆54Updated 2 years ago
- Automated Recon Framework☆24Updated 5 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Security test tool for Blind XSS☆26Updated 5 years ago
- ☆47Updated 4 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Updated 4 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- Advanced Recon Tool☆26Updated 5 years ago
- All the information provided on this site is for educational purposes only.☆18Updated last year
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆26Updated 4 years ago
- Common Wordlists☆54Updated 9 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago