bugbound / webnuke
A weird and wonderful console based tool for pentesting web applications
☆18Updated 5 years ago
Alternatives and similar repositories for webnuke:
Users that are interested in webnuke are comparing it to the libraries listed below
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- ☆32Updated 9 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Scripts for Deploying new server☆48Updated last week
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Updated 2 years ago
- A Custom Scanner for Burp☆30Updated 11 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- ☆21Updated 8 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- Docker Version of Aquatone☆14Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆37Updated 4 months ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- PDF report generator for basic recon☆9Updated 7 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago
- Quick and dirty scripts that don't really belong in a larger project☆34Updated 2 months ago
- A list of subdomains for some of the most popular sites on the internet☆11Updated 6 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- ☆61Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12Updated 9 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Exploit insecure crossdomain.xml files.☆26Updated 8 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆28Updated 5 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago