hvqzao / liffyLinks
Local File Inclusion Exploitation Tool (mirror)
☆128Updated 8 years ago
Alternatives and similar repositories for liffy
Users that are interested in liffy are comparing it to the libraries listed below
Sorting:
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆139Updated 4 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆259Updated 2 months ago
- XSS Hunter Burp Plugin☆150Updated 6 years ago
- GUI Burp Plugin to ease discovering of security holes in web applications☆150Updated 8 years ago
- An interactive OOB XXE data exfiltration tool☆90Updated 8 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆220Updated 2 years ago
- XSS Payloads☆49Updated 9 years ago
- A lab for playing with NoSQL Injection☆133Updated 5 years ago
- A collection of enhancements for Portswigger's popular Burp Suite web penetration testing tool.☆153Updated last year
- Damn Vulnerable File Upload V 1.1☆101Updated 7 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Updated last year
- Burp Suite extension to discover assets from HTTP response.☆227Updated 6 months ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆224Updated last year
- Burp Suite Extensions☆128Updated 12 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆158Updated last year
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆174Updated last year
- A tool to hunt for publicly accessible DigitalOcean Spaces☆158Updated 5 years ago
- Web Application Security☆127Updated last year
- A blind SQL injection module that uses bitshfting to calculate characters.☆129Updated 2 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆222Updated last year
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆276Updated 4 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 6 months ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- A collection of scripts to extend Burp Suite☆142Updated 6 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 9 months ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆152Updated 2 years ago
- subdomain bruteforce list☆101Updated 9 months ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago