☆18Oct 11, 2018Updated 7 years ago
Alternatives and similar repositories for ph2016
Users that are interested in ph2016 are comparing it to the libraries listed below
Sorting:
- ☆10Jun 14, 2016Updated 9 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆19May 29, 2017Updated 8 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 8 years ago
- Web Application Security☆130Jan 6, 2026Updated last month
- ☆44Sep 28, 2016Updated 9 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- [Python] Google Scraper & Mass Exploiter☆30Aug 17, 2021Updated 4 years ago
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago
- MCP use case for SecOps automation w/ Splunk,CrowdStrike EDR, MISP☆21Jul 7, 2025Updated 7 months ago
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- Code repository for Mastering Modern Web Penetration Testing, published by Packt☆72Jan 30, 2023Updated 3 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Code to Scraping some portion of Data from forum(RaidForums[seized by FBI]) with Python SCRAPY spiders bypassing recaptcha and storing to…☆10Feb 25, 2021Updated 5 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Oct 1, 2016Updated 9 years ago
- Professional RAG development skills for Claude Code - audit, evaluate, optimize, and scaffold RAG pipelines☆24Jan 18, 2026Updated last month
- Try harder to bypass that WAF...☆13Jan 4, 2015Updated 11 years ago
- Auto-Hacking-USB..... Explains Itself!☆13Jan 16, 2015Updated 11 years ago
- Recordization library☆11Updated this week
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- ☆10Sep 12, 2024Updated last year
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 3 months ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago