dradis / dradis-legacyView external linksLinks
This is a LEGACY repo head to
☆134Mar 20, 2024Updated last year
Alternatives and similar repositories for dradis-legacy
Users that are interested in dradis-legacy are comparing it to the libraries listed below
Sorting:
- network pcap fuzzer☆21Jan 19, 2015Updated 11 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆105Aug 8, 2016Updated 9 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- RWMC is no longer supported. Please use PowerMemory.☆164Feb 13, 2016Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Aug 2, 2016Updated 9 years ago
- Next-gen BurpSuite penetration testing tool☆460Jan 27, 2016Updated 10 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Jan 28, 2018Updated 8 years ago
- SpeedPhishing Framework☆448Aug 8, 2019Updated 6 years ago
- Dradis Framework: Collaboration and reporting for IT Security teams☆776Updated this week
- ☆12Oct 12, 2013Updated 12 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆602Feb 12, 2022Updated 4 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- Scripts for starting, stopping, checking setup and others ported from Kali Linux for general systemd systems☆17Jun 8, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- A vim docker setup that is a portable IDE☆14Nov 20, 2022Updated 3 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Feb 10, 2017Updated 9 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Sep 28, 2015Updated 10 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Android wireless karma attack detector☆67Aug 26, 2015Updated 10 years ago
- ☆46Sep 28, 2017Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- a collection of useful scripts that for penetration testers☆35Jan 22, 2022Updated 4 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Jun 23, 2019Updated 6 years ago
- ☆128Jul 17, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- A taster of TTWE☆18Sep 1, 2014Updated 11 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Jan 21, 2020Updated 6 years ago
- A collection of enhancements for Portswigger's popular Burp Suite web penetration testing tool.☆152Feb 21, 2024Updated last year