Th3R3p0 / AutoSec4WebApps
☆12Updated 7 years ago
Alternatives and similar repositories for AutoSec4WebApps:
Users that are interested in AutoSec4WebApps are comparing it to the libraries listed below
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Materials for 44con 2014 CANAPE Workshop☆22Updated 10 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆10Updated 9 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- ☆32Updated 9 years ago
- ☆24Updated 10 years ago
- ☆25Updated 8 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Automated enumeration☆30Updated 3 years ago
- Create custom Windows batch files from a configuration file☆31Updated 8 years ago