iknowjason / hammer
An example of a mis-configured Rails application release under MIT license.
☆20Updated 2 years ago
Alternatives and similar repositories for hammer:
Users that are interested in hammer are comparing it to the libraries listed below
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- ☆28Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆28Updated this week
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Updated 4 years ago
- a shared short domain for XSS and other hacks☆31Updated 2 years ago
- ☆23Updated 5 years ago
- Kubernetes Scanner☆40Updated 2 years ago
- A collection of one off hacks and simple scripts☆28Updated last year
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 4 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- ☆26Updated 2 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- ☆47Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year