apuigsech / seekretView external linksLinks
Go library and command line to seek for secrets on various sources.
☆242Nov 14, 2019Updated 6 years ago
Alternatives and similar repositories for seekret
Users that are interested in seekret are comparing it to the libraries listed below
Sorting:
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Aug 2, 2016Updated 9 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆142Aug 31, 2021Updated 4 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆255Mar 30, 2017Updated 8 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆333Apr 19, 2017Updated 8 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Apr 14, 2016Updated 9 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- ☆315May 22, 2016Updated 9 years ago
- Enumeration and reconnaissance activities in the Microsoft Azure Cloud.☆254Feb 20, 2019Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Web-based Source Code Vulnerability Scanner☆353Oct 8, 2017Updated 8 years ago
- A command line tool to detect shared passwords☆405Oct 5, 2016Updated 9 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆177Dec 1, 2022Updated 3 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- A demo of altering an opened tab after a timer☆123Jun 11, 2016Updated 9 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆872Aug 24, 2017Updated 8 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- ☆91Feb 22, 2021Updated 4 years ago
- Local UNIX PrivEsc Aggregation☆244Apr 9, 2016Updated 9 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆601Dec 6, 2024Updated last year
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 6 months ago