cameronhotchkies / Absinthe
A Blind SQL Exploitation application
☆79Updated 12 years ago
Related projects ⓘ
Alternatives and complementary repositories for Absinthe
- A blind SQL injection module that uses bitshfting to calculate characters.☆111Updated 2 years ago
- Tool to help identify timing attacks☆68Updated 13 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Homemade scripts to-do various vulnerable challenges☆75Updated 3 years ago
- Drag and Drop ClickJacking PoC development assistance tool.☆190Updated 4 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆167Updated 9 months ago
- Just a collection of pentest stuffs☆96Updated 4 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago
- Nikto for Windows with some extra features.☆175Updated 7 years ago
- A tool to generate media files with malicious metadata☆124Updated 5 years ago
- unix wildcard attacks☆132Updated 6 years ago
- Common Findings Database☆100Updated 5 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆267Updated 9 years ago
- Web recon tool (find temporary files, parse robots.txt, search some folders, google dorks and search domains hosted on same server)☆104Updated 7 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆94Updated last year
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆85Updated 8 years ago
- The OWASP AppSec Browser Bundle is an open source Linux based penetration testing browser bundle built over Mozilla Firefox. It comes pre…☆93Updated 10 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 6 years ago
- Damn Vulnerable File Upload V 1.1☆99Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Search drives for documents containing passwords☆62Updated 10 years ago
- Shodan HQ nmap plugin - passively scan targets☆151Updated 8 years ago
- Passive Vulnerability Auditor☆128Updated 8 years ago
- Shell-style script to search exploit-db.com exploits.☆59Updated 2 months ago
- ☆178Updated 10 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆174Updated 10 years ago
- Web Application Security☆124Updated 4 months ago
- ☆190Updated 6 years ago
- Getting BlindElephant into a working state, and updating the plugin files☆77Updated 4 years ago