☆106May 29, 2022Updated 3 years ago
Alternatives and similar repositories for old-website
Users that are interested in old-website are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- Simple multi threaded tool to extract domain related data from commoncrawl.org☆31Jul 17, 2018Updated 7 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Oct 3, 2012Updated 13 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Feb 2, 2019Updated 7 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆55Jul 21, 2016Updated 9 years ago
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- An interactive OOB XXE data exfiltration tool☆92May 31, 2017Updated 8 years ago
- ☆19Mar 20, 2014Updated 12 years ago
- Keyboard Weak Password☆28Mar 29, 2016Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Dec 1, 2016Updated 9 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆141Aug 31, 2021Updated 4 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Nov 12, 2019Updated 6 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 8 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- Extraction of iMessage Data via XSS☆51Apr 8, 2016Updated 9 years ago
- yara-python-dex enabled wheels☆11Aug 31, 2025Updated 6 months ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- This repo contains Writeups for the 35C3CTF.☆48Jan 4, 2019Updated 7 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- ☆22Mar 2, 2016Updated 10 years ago
- ☆133Nov 6, 2015Updated 10 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago