XiphosResearch / phuzzLinks
Find exploitable PHP files by parameter fuzzing and function call tracing
☆72Updated 9 years ago
Alternatives and similar repositories for phuzz
Users that are interested in phuzz are comparing it to the libraries listed below
Sorting:
- WhiteBox CMS analysis☆69Updated 2 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 13 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- A web application for generating custom XSS payloads☆77Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- This repository contains the POC of an exploit for node-jose < 0.11.0☆25Updated 2 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- A collection of Nmap NSE scripts that I made.☆30Updated 13 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 8 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- Group Policy Hijacking☆32Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- A tool to generate media files with malicious metadata☆129Updated 7 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Updated 7 years ago
- Search drives for documents containing passwords☆65Updated 11 years ago
- Upgrade your netcat shell today!☆58Updated 8 years ago
- unix wildcard attacks☆137Updated 7 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Updated 7 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Screenshot Shenanigans☆26Updated 8 years ago