giovanifss / Dumb
Dumain Bruteforcer - a fast and flexible domain bruteforcer
☆53Updated 6 years ago
Related projects: ⓘ
- ☆61Updated this week
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- ☆20Updated this week
- WhiteBox CMS analysis☆68Updated last year
- ☆40Updated this week
- A tool to help you manage your leaks☆34Updated 6 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- ☆35Updated this week
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 3 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- ☆51Updated this week
- ☆54Updated this week
- Hacking challenges☆32Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- ☆33Updated this week
- Various tools for managing bug bounty recon and exploration.☆46Updated last year
- Allows you to trace where inputs are reflected back to the user.☆37Updated 6 years ago
- SQL SERVER Exploitation.☆27Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 4 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- ☆26Updated this week
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆24Updated 7 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- A collection of Nmap NSE scripts that I made.☆26Updated 11 years ago
- ☆68Updated this week
- ☆19Updated this week
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 5 years ago