API testing tool written with Python
☆56Feb 8, 2017Updated 9 years ago
Alternatives and similar repositories for pURL
Users that are interested in pURL are comparing it to the libraries listed below
Sorting:
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- SSL Scanner written in Crystal☆17Mar 16, 2018Updated 8 years ago
- ☆39Sep 23, 2019Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆277Jan 13, 2020Updated 6 years ago
- Scripts and tools for AWS Pentest☆53Oct 22, 2020Updated 5 years ago
- This is the Command & Control component of the PlugBot project☆102Feb 15, 2022Updated 4 years ago
- My Shellcode Archive☆29Mar 21, 2017Updated 9 years ago
- Burp Suite extension to discover assets from HTTP response.☆232Jan 22, 2025Updated last year
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆85May 10, 2018Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104May 1, 2022Updated 3 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- subdomain bruteforce list☆101Oct 12, 2024Updated last year
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆124Feb 4, 2019Updated 7 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- Extract relative urls from a heap snapshot☆87May 30, 2021Updated 4 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Feb 9, 2024Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆96Feb 21, 2020Updated 6 years ago
- ☆54Nov 5, 2024Updated last year
- CACTUSTORCH: Payload Generation for Adversary Simulations☆77Jul 3, 2018Updated 7 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35May 24, 2024Updated last year