alekseykorzun / php-auditLinks
phpAudit is a simple shell script that scans PHP files for possible security risks.
☆26Updated 12 years ago
Alternatives and similar repositories for php-audit
Users that are interested in php-audit are comparing it to the libraries listed below
Sorting:
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Updated 12 years ago
- Various pentest scripts☆14Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆29Updated 9 years ago
- Some helper tools for network pentest☆20Updated 12 years ago
- Cross-site request forgery Learning Platform☆21Updated 11 years ago
- ☆16Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Updated 11 years ago
- NMAP NSE that enumerates VNC authentication types☆17Updated 14 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Updated 10 years ago
- Bash script for checking HTTP headers for security☆17Updated 11 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Updated 10 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 11 years ago
- Wordpress Plugins Scanner it's a semi-automatic white box pentesting/crawler app for WP plugins using RIPS from OWASP.☆13Updated 12 years ago
- Ruby Oracle Security Scanner☆16Updated 13 years ago
- Check for HTTP Security Headers☆14Updated 10 years ago
- ☆15Updated 11 years ago
- Evil snippets of Underhanded Red Team tactics☆11Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Updated 12 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Updated 10 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago