Db Database Assessment Tool
☆211Jun 26, 2018Updated 7 years ago
Alternatives and similar repositories for DbDat
Users that are interested in DbDat are comparing it to the libraries listed below
Sorting:
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Nov 17, 2017Updated 8 years ago
- Exports Kerberos KrbCred Tickets for use in Mimikatz/Beacon from a Kerberos CCache File☆89Jul 22, 2015Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Dec 8, 2017Updated 8 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 2 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Check UNIX/Linux systems for privilege escalation☆126Mar 31, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Network traffic sensor☆115Jun 8, 2022Updated 3 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆599Feb 12, 2022Updated 4 years ago
- A regex based source code scanner.☆127Apr 8, 2017Updated 8 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆509Jul 13, 2022Updated 3 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 3 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Next-gen BurpSuite penetration testing tool☆462Jan 27, 2016Updated 10 years ago
- This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, y…☆215Nov 8, 2019Updated 6 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆124Feb 4, 2019Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago