hack-all-the-things / charsetinspectLinks
A script that inspects multi-byte character sets looking for characters with specific user-defined properties
☆26Updated 9 years ago
Alternatives and similar repositories for charsetinspect
Users that are interested in charsetinspect are comparing it to the libraries listed below
Sorting:
- Duncan - Blind SQL injector skeleton☆59Updated 3 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- Hackerone disclosed report URL Aggregator☆30Updated 7 years ago
- A PoC for exploiting Guzzle's HTTP_PROXY untrusted read☆55Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Updated 6 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Damn Small FI Scanner☆61Updated 6 years ago
- ☆20Updated last year
- Reflective/DOM XSS scanner built on casperJS☆81Updated 11 years ago
- Source Code Intelligence☆30Updated 8 years ago
- library and intepreter for penetration testing tools☆30Updated 9 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 9 years ago
- ☆22Updated 9 years ago
- Puny Domain Name Check☆37Updated 6 years ago
- Cronbased Dirty Cow Exploit☆30Updated 8 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 13 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Updated 10 years ago
- ☆10Updated 9 years ago