adithyan-ak / WAVE
Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web applications.
β26Updated 2 years ago
Alternatives and similar repositories for WAVE:
Users that are interested in WAVE are comparing it to the libraries listed below
- "π Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results stoβ¦β22Updated last year
- Information-Gathering Shell Scriptβ29Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.β47Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ21Updated 2 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.β43Updated last month
- A Python based Recon Tool to search for Storage Bucketsβ11Updated 2 years ago
- A python approach to interacting with web shells.β29Updated 4 years ago
- Hit valid URLβ22Updated 3 years ago
- xss vulnerability scanner and input fuzzing tool.β61Updated last year
- Spaghetti - Web Application Security Scannerβ19Updated 7 years ago
- Tool to generate csrf payloads based on vulnerable requestsβ62Updated 4 years ago
- The Multi-Tool Web application vulnerability scanner.β52Updated 3 years ago
- DNSrecon tool with GUI for Kali Linuxβ56Updated 2 years ago
- Pipe different tools with google dork Scannerβ55Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.β21Updated 2 years ago
- security.txt collection of most popular world-wide domainsβ53Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- Web application recon for bug bountyβ22Updated 4 years ago
- Cross Site Scripting ( XSS ) Vulnerability Payload Listβ22Updated 4 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Toolsβ41Updated 2 years ago
- Top password lists generated from leaks collected from different paste sitesβ30Updated 2 years ago
- BugBuntu Linuxβ15Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bountyβ38Updated 6 months ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.β37Updated last month
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overfβ¦β18Updated 4 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several lβ¦β33Updated 3 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKsβ62Updated 3 years ago
- World's most Powerful and Advanced Cross Site Scripting Softwareβ28Updated 5 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.β17Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challengesβ32Updated 2 years ago