drego85 / htpw
htpw is a project to increase the security of your WordPress!
☆52Updated 6 months ago
Alternatives and similar repositories for htpw:
Users that are interested in htpw are comparing it to the libraries listed below
- A commandline vulnerability reporter using WP-CLI and WPVulnDB☆32Updated last year
- Static analysis of wordpress plugins☆62Updated 4 years ago
- A Web Malware Scanner☆96Updated 2 years ago
- Blazescan is a linux webserver malware scanning and incident response tool, with built in support for cPanel servers, but will run on any…☆60Updated 6 years ago
- Official collection of HackInBo® talks, slides, and event programs.☆78Updated last month
- ☆62Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- Extracting IoC data from eMail☆131Updated 3 months ago
- Scanner in grado di notificare nuovi movimenti sull'estratto conto della PostePay☆7Updated 6 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- ☆27Updated 3 years ago
- Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.☆69Updated 3 years ago
- Collection of malware files found on WordPress sites☆55Updated 7 months ago
- Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.☆181Updated 5 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆26Updated 9 months ago
- ☆71Updated 3 years ago
- ☆28Updated this week
- Wordpress security functions for paranoid folks. (themes functions.php and .htaccess). Take what you want, leave what you think should be…☆165Updated last year
- bash poc scripts to exploit open fpm ports☆60Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustr…☆18Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆73Updated 3 years ago
- A wordpress security auditor! Audit your wordpress application for security issues with even 1 request.☆39Updated 9 months ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Updated 4 years ago
- SNIcat☆126Updated 3 years ago
- Nmap NSE scripts that have been customised or created☆97Updated 3 years ago
- A static code analysis for WordPress (and PHP)☆236Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- C# User Simulation☆32Updated 2 years ago