a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.
☆18Jan 22, 2025Updated last year
Alternatives and similar repositories for CustomActiveScanForZAP
Users that are interested in CustomActiveScanForZAP are comparing it to the libraries listed below
Sorting:
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆27Apr 17, 2022Updated 3 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- SendToXray - Burp Suite Extender, Send HTTP request to XRAY proxy.☆11May 22, 2021Updated 4 years ago
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- Contenido de herramientas OSINT con Docker. Tambien nos podes visitar en el canal de youtube (https://www.youtube.com/user/marcospr74/)☆19Jan 4, 2021Updated 5 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago
- A playground to test various prompt injection techniques and bypasses.☆20Mar 31, 2023Updated 2 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- A Target Tracking , NoteTaking , CheckLists and Data Management GUI App for Bug Hunter's and Pentesters.☆42Jun 19, 2022Updated 3 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆23Jun 25, 2023Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26May 14, 2023Updated 2 years ago
- Tool queries the OpenAI API to enhance the description, impact, and recommendation keys of a nuclei template.☆21Apr 1, 2023Updated 2 years ago
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆23Jul 15, 2021Updated 4 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 3 years ago
- Hello, Attack Surface Scan, BurpSuite完全被动扫描插件,不主动发送任何请求,适合挂机使用。☆24Jul 10, 2022Updated 3 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Jul 10, 2017Updated 8 years ago
- spring4shell | CVE-2022-22965☆23Jun 30, 2022Updated 3 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Jul 14, 2017Updated 8 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- Aizawa is a command-line webshell designed to execute commands through HTTP header☆67Nov 23, 2025Updated 3 months ago
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated 3 weeks ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆30Nov 15, 2024Updated last year