faffi / curlitLinks
Burp plugin to turn requests into curl commands
☆16Updated 11 years ago
Alternatives and similar repositories for curlit
Users that are interested in curlit are comparing it to the libraries listed below
Sorting:
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Updated 11 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- Exploits and research stuffs☆54Updated 3 weeks ago
- Working Rsh Client With Bind/Reverse Shell☆19Updated 10 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- XXE vulnerability demo☆22Updated 11 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 12 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Updated 3 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 5 years ago
- Customizable lazy exploit pattern utility.☆13Updated 3 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Updated 12 years ago
- Exploits, Fuzzers, Scripts etc☆35Updated last month
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 5 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Updated 5 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 6 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 10 years ago
- Example ASM code following SLAE course and exam assignments.☆37Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 10 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 8 years ago