dpnishant / raptorView external linksLinks
Web-based Source Code Vulnerability Scanner
☆353Oct 8, 2017Updated 8 years ago
Alternatives and similar repositories for raptor
Users that are interested in raptor are comparing it to the libraries listed below
Sorting:
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆822Dec 6, 2017Updated 8 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147May 10, 2016Updated 9 years ago
- A tool that can scan php vulnerabilities automatically using static analysis methods☆488Mar 20, 2018Updated 7 years ago
- Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.☆571Mar 8, 2023Updated 2 years ago
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 6 months ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- Automatic SQL injection with Charles and sqlmap api☆820May 1, 2018Updated 7 years ago
- Fox-scan is a initiative and passive SQL Injection vulnerable Test tools.☆407Oct 6, 2016Updated 9 years ago
- PHP Frontend to work with the SQLMAP JSON API Server (sqlmapapi.py) to allow for a Web GUI to drive near full functionality of SQLMAP!☆324Aug 31, 2015Updated 10 years ago
- htcap is a web application scanner able to crawl single page application (SPA) recursively by intercepting ajax calls and DOM changes.☆625Oct 11, 2021Updated 4 years ago
- A framework used for Vulnerability scanning☆105Apr 22, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Aug 2, 2016Updated 9 years ago
- a new crawler based on python with more function including Network fingerprint search☆504Aug 14, 2018Updated 7 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Feb 18, 2020Updated 5 years ago
- 被动式漏洞扫描系统☆873Nov 1, 2017Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Source Code Security Audit (源代码安全审计)☆3,188Sep 16, 2022Updated 3 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆333Apr 19, 2017Updated 8 years ago
- Automatic XSS filter bypass☆90Aug 20, 2015Updated 10 years ago
- ☆212Apr 17, 2017Updated 8 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆602Feb 12, 2022Updated 4 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆163Jan 21, 2021Updated 5 years ago
- Zmap on Web☆94Oct 13, 2016Updated 9 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆601Dec 6, 2024Updated last year
- This project has stopped to maintenance, please to https://github.com/knownsec/pocsuite3 project.☆1,821May 27, 2022Updated 3 years ago
- A domain/ip fuzzing tool for vulnerability mining☆99Mar 13, 2015Updated 10 years ago
- Go library and command line to seek for secrets on various sources.☆242Nov 14, 2019Updated 6 years ago
- Advanced Web Shell☆579May 1, 2017Updated 8 years ago
- a plenty of poc based on python☆290Jun 10, 2017Updated 8 years ago
- SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.☆479Jan 1, 2018Updated 8 years ago
- pentest framework☆1,243Feb 21, 2019Updated 6 years ago
- ☆332Jan 8, 2018Updated 8 years ago
- ☆78Oct 28, 2015Updated 10 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆172Jun 11, 2014Updated 11 years ago
- Next-gen BurpSuite penetration testing tool☆460Jan 27, 2016Updated 10 years ago
- ☆91Feb 22, 2021Updated 4 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago