dogancanbakir / pirebokLinks
pîrebok (from Kurdish "witch") - a guided adversarial fuzzer
☆15Updated 2 years ago
Alternatives and similar repositories for pirebok
Users that are interested in pirebok are comparing it to the libraries listed below
Sorting:
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆42Updated 3 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 5 years ago
- ☆19Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Exactly what it sounds like, which is something rad☆23Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- Scripts for OSCE☆18Updated 6 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- ☆26Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32Updated 3 years ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Updated 5 years ago
- ☆24Updated 2 years ago
- ☆21Updated 3 months ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- ☆17Updated 2 years ago
- Simple S3 Bucket Testing Software☆31Updated 4 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Updated 3 months ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- μετάμάσκα - malevolent payload classifier☆24Updated 2 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- ☆12Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago