adithyan-ak / WAVELinks
Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web applications.
☆26Updated 4 months ago
Alternatives and similar repositories for WAVE
Users that are interested in WAVE are comparing it to the libraries listed below
Sorting:
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- Notes from OSCP, CTF, security adventures, etc...☆64Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- Host Header Injection Scanner☆50Updated 5 years ago
- Yet another web recon tool☆61Updated 2 years ago
- Mobile Application Vulnerability Scanner☆25Updated 11 months ago
- Headless web crawler for bugbounty and penetration-testing/redteaming☆39Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆99Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 4 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated last month
- Top password lists generated from leaks collected from different paste sites☆32Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Updated 4 years ago
- Spaghetti - Web Application Security Scanner☆21Updated 8 years ago
- ☆49Updated 5 years ago
- Dorks for Google, Shodan and BinaryEdge☆142Updated 5 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Updated 4 years ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆48Updated last year
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 5 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- A simple place to learn XSS☆31Updated 4 years ago
- A curated list of various bug bounty tools☆19Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year