Web hacking assistance toolkit
☆111Sep 19, 2017Updated 8 years ago
Alternatives and similar repositories for libpywebhack
Users that are interested in libpywebhack are comparing it to the libraries listed below
Sorting:
- Burp Suite plugin for binary search on HTTP parameters☆17Oct 31, 2017Updated 8 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆140Feb 18, 2021Updated 5 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- procfs-based PHP sandbox bypass☆133Sep 19, 2018Updated 7 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- Asynchronous HTTP pipelining directory buster☆24Jul 28, 2020Updated 5 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- Study about HQL injection exploitation.☆51May 15, 2016Updated 9 years ago
- Vulners signature-base software version detection rules☆38Nov 9, 2021Updated 4 years ago
- Burp Suite extension for JAX-RS☆65Mar 17, 2017Updated 8 years ago
- A tiny and cute URL fuzzer☆402Nov 10, 2022Updated 3 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Advanced virtual host bruteforcer☆31Nov 23, 2015Updated 10 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- ☆58Oct 10, 2016Updated 9 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Web recon tool (find temporary files, parse robots.txt, search some folders, google dorks and search domains hosted on same server)☆105Nov 22, 2016Updated 9 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- List of configuration files from WEB-INF and META-INF for use in Unvalidated Forwards and JSP Include vulnerabilities.☆84Mar 23, 2018Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- DNS代理服务器,可以记录log到数据库中☆85Aug 15, 2017Updated 8 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Nov 15, 2024Updated last year
- S2-046-PoC☆112Mar 21, 2017Updated 8 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- 各种漏洞poc、Exp的收集或编写☆32Jun 24, 2016Updated 9 years ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- Outlook addin Back Door☆11Dec 2, 2015Updated 10 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- ☆91Feb 22, 2021Updated 5 years ago
- spring mvc cve-2014-3625☆32Mar 11, 2016Updated 9 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆158Nov 29, 2018Updated 7 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Jan 22, 2016Updated 10 years ago