hvqzao / liffyLinks
Local File Inclusion Exploitation Tool (mirror)
☆127Updated 8 years ago
Alternatives and similar repositories for liffy
Users that are interested in liffy are comparing it to the libraries listed below
Sorting:
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆139Updated 4 years ago
- XSS Hunter Burp Plugin☆149Updated 6 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆257Updated last month
- A collection of enhancements for Portswigger's popular Burp Suite web penetration testing tool.☆153Updated last year
- Damn Vulnerable File Upload V 1.1☆101Updated 7 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆158Updated last year
- Burp Suite Extensions☆127Updated 11 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Updated last year
- An interactive OOB XXE data exfiltration tool☆90Updated 8 years ago
- XSS Payloads☆49Updated 9 years ago
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆219Updated 2 years ago
- ☆206Updated 4 years ago
- A lab for playing with NoSQL Injection☆132Updated 4 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆173Updated last year
- A tool to hunt for publicly accessible DigitalOcean Spaces☆157Updated 5 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆157Updated 3 months ago
- GUI Burp Plugin to ease discovering of security holes in web applications☆150Updated 8 years ago
- ☆121Updated 8 years ago
- A Burp Extension designed to identify argument injection vulnerabilities.☆121Updated 6 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 5 months ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 9 months ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆276Updated 4 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 10 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆224Updated last year
- Burp Suite extension to discover assets from HTTP response.☆227Updated 5 months ago
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago