☆16Oct 30, 2022Updated 3 years ago
Alternatives and similar repositories for waf-workshop
Users that are interested in waf-workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- ☆71Nov 8, 2021Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- ☆13Nov 5, 2017Updated 8 years ago
- ☆14Mar 8, 2023Updated 3 years ago
- Discord bot to display events and information about a CTFd instance (https://ctfd.io/)☆11Jul 9, 2024Updated last year
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 6 years ago
- Test the speed and reliability of a list of DNS servers☆22Dec 9, 2020Updated 5 years ago
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆25Mar 7, 2023Updated 3 years ago
- ☆12Feb 20, 2025Updated last year
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Mar 12, 2022Updated 4 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- This repository holds all material related to the Ory Summit, specifically the presentations.☆12Oct 22, 2025Updated 5 months ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Graphql introspection query analyzer.☆18Mar 28, 2023Updated 2 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- a simple wii homebrew application demonstrating a simple gba input viewer☆11Apr 22, 2016Updated 9 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- ☆11Feb 12, 2023Updated 3 years ago
- ☆20Feb 3, 2020Updated 6 years ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- Transcribe Greek text to Latin alphabet using the ISO 843:1997 standard (also known as ELOT 743:1987)☆13Oct 12, 2022Updated 3 years ago
- sub domain wild card filtering tool☆40Apr 18, 2020Updated 5 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Aug 6, 2020Updated 5 years ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Mar 18, 2023Updated 3 years ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated 2 months ago
- Cve and Exploit Finder on the target☆28May 8, 2022Updated 3 years ago
- C-based Reverse Shell that uses CMD or PowerShell☆16Aug 15, 2020Updated 5 years ago
- An interactive tool to analyze Golang goroutine dump.☆12Mar 7, 2025Updated last year
- An example of a GitHub Actions workflow showing how code scanning with CodeQL can be parallelized on monorepos.☆15Dec 14, 2022Updated 3 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- ☆12Nov 21, 2019Updated 6 years ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- Material from presentations done by GoSecure researchers☆34Oct 10, 2023Updated 2 years ago
- Advanced Sub-domain Enumerator☆10Mar 14, 2020Updated 6 years ago