Drupal enumeration & exploitation tool
☆609Nov 4, 2020Updated 5 years ago
Alternatives and similar repositories for drupwn
Users that are interested in drupwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.☆1,414Jan 19, 2024Updated 2 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,177Sep 11, 2024Updated last year
- Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)☆594Jan 8, 2021Updated 5 years ago
- This tool can be used to brute discover GET and POST parameters☆1,395Aug 24, 2019Updated 6 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs☆2,528Apr 9, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,925Apr 13, 2022Updated 3 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆472Nov 14, 2019Updated 6 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- DNS Takeover tool written in Go☆2,044Mar 16, 2026Updated 3 weeks ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,135Apr 21, 2024Updated last year
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- A Tool for Domain Flyovers☆5,921May 22, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A script to enumerate virtual hosts on a server.☆690Dec 28, 2017Updated 8 years ago
- ODAT: Oracle Database Attacking Tool☆1,748Mar 31, 2026Updated last week
- kernel privilege escalation enumeration and exploitation framework☆702Aug 2, 2018Updated 7 years ago
- JShell - Get a JavaScript shell with XSS.☆534May 5, 2019Updated 6 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,285Aug 18, 2025Updated 7 months ago
- Steal Net-NTLM Hash using Bad-PDF☆1,140Oct 20, 2025Updated 5 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,794Apr 26, 2024Updated last year
- CVE-2017-9506 - SSRF☆190Feb 14, 2022Updated 4 years ago
- File upload vulnerability scanner and exploitation tool.☆3,310May 8, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆273Mar 24, 2021Updated 5 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- A small tool that extracts relative URLs from a file.☆768Sep 23, 2020Updated 5 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,259Jan 8, 2026Updated 3 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,479Jan 9, 2025Updated last year
- CMS Scanner: Scan Wordpress, Drupal, Joomla, vBulletin websites for Security issues☆1,066May 18, 2021Updated 4 years ago
- ☆2,320Dec 8, 2023Updated 2 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A python script that finds endpoints in JavaScript files☆4,322Apr 13, 2024Updated last year
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,733Dec 1, 2024Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- 💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002☆352Mar 29, 2019Updated 7 years ago
- Quick SQLMap Tamper Suggester☆1,401Jul 18, 2022Updated 3 years ago
- Fast, multi-protocol credential brute-forcer. Parses Nmap, Nessus, and Nexpose output to automatically test default and custom credential…☆2,402Updated this week
- CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.☆1,162Dec 1, 2021Updated 4 years ago