Drupal enumeration & exploitation tool
☆612Nov 4, 2020Updated 5 years ago
Alternatives and similar repositories for drupwn
Users that are interested in drupwn are comparing it to the libraries listed below
Sorting:
- A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.☆1,405Jan 19, 2024Updated 2 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,171Sep 11, 2024Updated last year
- Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)☆593Jan 8, 2021Updated 5 years ago
- This tool can be used to brute discover GET and POST parameters☆1,393Aug 24, 2019Updated 6 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs☆2,519Apr 9, 2024Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,914Apr 13, 2022Updated 3 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆469Nov 14, 2019Updated 6 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,042Nov 24, 2019Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- A script to enumerate virtual hosts on a server.☆691Dec 28, 2017Updated 8 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,120Apr 21, 2024Updated last year
- kernel privilege escalation enumeration and exploitation framework☆701Aug 2, 2018Updated 7 years ago
- Subdomain Takeover tool written in Go☆2,028Aug 13, 2023Updated 2 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,142Oct 20, 2025Updated 4 months ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,128Feb 10, 2021Updated 5 years ago
- ODAT: Oracle Database Attacking Tool☆1,743Jul 27, 2024Updated last year
- Quick SQLMap Tamper Suggester☆1,395Jul 18, 2022Updated 3 years ago
- A Tool for Domain Flyovers☆5,906May 22, 2022Updated 3 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,774Apr 26, 2024Updated last year
- ☆2,316Dec 8, 2023Updated 2 years ago
- Free web-application vulnerability and version scanner☆576Mar 1, 2025Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,285Aug 18, 2025Updated 6 months ago
- File upload vulnerability scanner and exploitation tool.☆3,300May 8, 2025Updated 9 months ago
- CVE-2017-9506 - SSRF☆190Feb 14, 2022Updated 4 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,244Jan 8, 2026Updated last month
- DNS Rebinding Exploitation Framework☆493Apr 27, 2021Updated 4 years ago
- Pop shells like a master.☆1,489Apr 2, 2019Updated 6 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,374Feb 23, 2026Updated last week
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,710Dec 1, 2024Updated last year
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆272Mar 24, 2021Updated 4 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆982Aug 1, 2023Updated 2 years ago
- SMBMap is a handy SMB enumeration tool☆2,020Jan 6, 2026Updated last month