XiphosResearch / phuzzLinks
Find exploitable PHP files by parameter fuzzing and function call tracing
☆73Updated 8 years ago
Alternatives and similar repositories for phuzz
Users that are interested in phuzz are comparing it to the libraries listed below
Sorting:
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆80Updated 8 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated 8 months ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- ☆73Updated 6 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- ☆32Updated 10 years ago
- Upgrade your netcat shell today!☆60Updated 8 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Check for .net padding oracle patch☆20Updated 6 years ago
- Group Policy Hijacking☆32Updated 7 years ago
- unix wildcard attacks☆135Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- bash poc scripts to exploit open fpm ports☆60Updated 6 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 11 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 5 years ago
- public exploits☆35Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago