asaafan / CSurfer
A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly
☆18Updated 9 years ago
Alternatives and similar repositories for CSurfer:
Users that are interested in CSurfer are comparing it to the libraries listed below
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆14Updated last year
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆51Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- BurpSuite extension for Repeater tool that renders responses in a real browser.☆7Updated 11 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆20Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- My presentations from different conferences☆15Updated 6 years ago
- Projects and POCs☆60Updated 10 years ago
- FUD Metasploit Android Payload☆11Updated 9 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 3 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- ☆10Updated 9 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- Windows Privesc Check☆20Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago