Lfi Scan Tool
☆108May 16, 2023Updated 2 years ago
Alternatives and similar repositories for Lfi-Space
Users that are interested in Lfi-Space are comparing it to the libraries listed below
Sorting:
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆299Jan 7, 2024Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Jun 18, 2023Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- XXST-白加黑辅助挖掘工具,全程静默运行不影响正常使用☆17Apr 12, 2024Updated last year
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 3 weeks ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆104Dec 8, 2025Updated 2 months ago
- Automate Blind SQL Injection with Python.☆23Aug 20, 2022Updated 3 years ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- An XSS Exploitation Tool☆338Dec 5, 2025Updated 3 months ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- ☆90Aug 5, 2023Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- A BurpSuite extension for vulnerability Scanning☆29Feb 16, 2024Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- Script for generating revshells☆478Sep 10, 2024Updated last year
- MultiPlatform HTTP Reverse Shell☆242Dec 31, 2025Updated 2 months ago
- ☆36Apr 24, 2024Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆181Feb 27, 2024Updated 2 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆244Jul 3, 2024Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆46Mar 15, 2024Updated last year
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆30Feb 22, 2018Updated 8 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52May 26, 2024Updated last year
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago
- The Best DDoS Attack Tool + Bypass Cloud Flare CDN For Priv8☆19Oct 14, 2025Updated 4 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆31Feb 17, 2023Updated 3 years ago