infodox / web-exploitation-engineLinks
Generic Command Exploitation Engine for exploiting web application command-injection bugs,.
☆31Updated 12 years ago
Alternatives and similar repositories for web-exploitation-engine
Users that are interested in web-exploitation-engine are comparing it to the libraries listed below
Sorting:
- Windows Privesc Check☆20Updated 11 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- BurpJDSer-ng☆29Updated last week
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- ☆11Updated 7 years ago
- ☆10Updated 9 years ago
- ☆15Updated 2 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- ☆20Updated 5 years ago
- BurpSuite extension for Repeater tool that renders responses in a real browser.☆7Updated 11 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 6 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- ☆13Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago