epinna / tplmap
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
☆3,929Updated last year
Alternatives and similar repositories for tplmap:
Users that are interested in tplmap are comparing it to the libraries listed below
- Automatic SSRF fuzzer and exploitation tool☆3,180Updated 2 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,782Updated 3 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,064Updated 2 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,398Updated 6 months ago
- Web application fuzzer☆6,162Updated 8 months ago
- A curated list of amazingly awesome Burp Extensions☆3,166Updated 2 months ago
- A Tool for Domain Flyovers☆5,755Updated 2 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,811Updated 3 years ago
- Monitor linux processes without root permissions☆5,392Updated 2 years ago
- Linux privilege escalation auditing tool☆5,926Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,060Updated last year
- HTTP parameter discovery suite.☆5,600Updated 2 months ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆5,624Updated 4 months ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,514Updated last year
- Weaponized web shell☆3,296Updated 6 months ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,459Updated 5 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,339Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,248Updated last week
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,588Updated last year
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,625Updated 5 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,280Updated 6 months ago
- File upload vulnerability scanner and exploitation tool.☆3,196Updated 2 years ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆5,793Updated last week
- A python script that finds endpoints in JavaScript files☆3,934Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,648Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,053Updated 9 months ago
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,455Updated 3 weeks ago
- ✍️ A curated list of CVE PoCs.☆3,395Updated 3 years ago
- Next-Generation Linux Kernel Exploit Suggester☆1,909Updated 2 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,098Updated last year