bedirhan / wivet
Web Input Vector Extractor Teaser
☆131Updated 3 years ago
Alternatives and similar repositories for wivet:
Users that are interested in wivet are comparing it to the libraries listed below
- a passive scanner based on Mitmproxy and Arachni☆112Updated 7 years ago
- Develop Burp extensions in Jython☆178Updated 8 years ago
- ☆46Updated 8 years ago
- ☆55Updated 8 years ago
- Script to test if a server is vulnerable to the JetLeak vulnerability☆144Updated 8 years ago
- WAF Research☆179Updated 2 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆172Updated 8 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 7 years ago
- ☆78Updated 10 years ago
- NagaScan is a distributed passive scanner for Web application.☆90Updated 7 years ago
- ☆232Updated 9 years ago
- Flash XSS Scanner☆53Updated 8 years ago
- Central Repo for Burp extensions☆150Updated 3 years ago
- CVE 2017-9805☆59Updated 4 years ago
- CVE-2018-7600 - Drupal 7.x RCE☆71Updated 6 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- YSOSERIAL Integration with burp suite☆163Updated 2 years ago
- A Java serializer in JavaScript☆82Updated 6 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- xss.js.org☆69Updated 4 years ago
- ☆89Updated 4 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆46Updated 9 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆209Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆52Updated 8 years ago
- SecurityPaper For www.polaris-lab.com☆104Updated 5 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆136Updated 4 years ago
- Automated SonarQube☆73Updated 5 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆290Updated last year
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116Updated 5 years ago
- ☆78Updated 9 years ago