XiphosResearch / phuzzLinks
Find exploitable PHP files by parameter fuzzing and function call tracing
☆72Updated 8 years ago
Alternatives and similar repositories for phuzz
Users that are interested in phuzz are comparing it to the libraries listed below
Sorting:
- WhiteBox CMS analysis☆68Updated 2 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated 11 months ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Updated 7 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 13 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 8 years ago
- Screenshot Shenanigans☆26Updated 8 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 6 years ago
- PHP tool to test XSS☆22Updated 6 years ago
- ☆73Updated 6 years ago
- ☆15Updated 2 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 8 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Upgrade your netcat shell today!☆58Updated 8 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- ☆38Updated 5 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- ☆85Updated 10 years ago