Drupal enumeration & exploitation tool
☆616Nov 4, 2020Updated 5 years ago
Alternatives and similar repositories for drupwn
Users that are interested in drupwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.☆1,426Jan 19, 2024Updated 2 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,187Sep 11, 2024Updated last year
- Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)☆597Jan 8, 2021Updated 5 years ago
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs☆2,539Apr 9, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,941Apr 13, 2022Updated 4 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,045Nov 24, 2019Updated 6 years ago
- DNS Takeover tool written in Go☆2,065Mar 16, 2026Updated 2 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆944May 8, 2019Updated 7 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,155Apr 21, 2024Updated 2 years ago
- Remote Recon and Collection☆461Nov 23, 2017Updated 8 years ago
- A Tool for Domain Flyovers☆5,937May 22, 2022Updated 4 years ago
- A script to enumerate virtual hosts on a server.☆693Dec 28, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ODAT: Oracle Database Attacking Tool☆1,762Mar 31, 2026Updated last month
- kernel privilege escalation enumeration and exploitation framework☆704Aug 2, 2018Updated 7 years ago
- JShell - Get a JavaScript shell with XSS.☆533May 5, 2019Updated 7 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,143Oct 20, 2025Updated 7 months ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,293Aug 18, 2025Updated 9 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,802Apr 26, 2024Updated 2 years ago
- CVE-2017-9506 - SSRF☆191Feb 14, 2022Updated 4 years ago
- File upload vulnerability scanner and exploitation tool.☆3,319May 8, 2025Updated last year
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆273Mar 24, 2021Updated 5 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Feb 10, 2021Updated 5 years ago
- A small tool that extracts relative URLs from a file.☆768Sep 23, 2020Updated 5 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,279Jan 8, 2026Updated 4 months ago
- CMS Scanner: Scan Wordpress, Drupal, Joomla, vBulletin websites for Security issues☆1,066May 18, 2021Updated 5 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,495Jan 9, 2025Updated last year
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆91May 8, 2018Updated 8 years ago
- ☆2,326Dec 8, 2023Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆4,350Apr 13, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,747Dec 1, 2024Updated last year
- 💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002☆354Mar 29, 2019Updated 7 years ago
- Quick SQLMap Tamper Suggester☆1,403Jul 18, 2022Updated 3 years ago
- Fast, multi-protocol credential brute-forcer. Parses Nmap, Nessus, and Nexpose output to automatically test default and custom credential…☆2,420May 11, 2026Updated last week
- CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.☆1,163Dec 1, 2021Updated 4 years ago
- ☆99May 3, 2018Updated 8 years ago