The databases, API's and managers behind https://websecweekly.org
☆50Mar 24, 2015Updated 10 years ago
Alternatives and similar repositories for websec-weekly
Users that are interested in websec-weekly are comparing it to the libraries listed below
Sorting:
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd☆194Apr 1, 2016Updated 9 years ago
- Traverse JS files for APIs/Endpoints☆15May 12, 2015Updated 10 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- Abusing trust boundaries to deliver effective phishing payloads☆35Dec 8, 2015Updated 10 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆135Nov 17, 2016Updated 9 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Oct 21, 2014Updated 11 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions☆226Mar 29, 2022Updated 3 years ago
- Basic USB passthrough from a host PC to a Beaglebone Black (or any device capable of using GadgetFs)☆17Oct 9, 2016Updated 9 years ago
- ☆15Jun 29, 2016Updated 9 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- SlyPI☆20Jun 13, 2013Updated 12 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Sep 17, 2020Updated 5 years ago
- A CUI Struts2 Vulnerability Exploit☆16Jul 29, 2016Updated 9 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Aug 2, 2016Updated 9 years ago
- Simple, useful scripts for red/blue team situations☆22May 4, 2015Updated 10 years ago
- HackerOne Public Disclosure Slack Bot☆20Sep 19, 2022Updated 3 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- ☆18Oct 11, 2018Updated 7 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆45Dec 24, 2018Updated 7 years ago
- Config files for my GitHub profile.☆18Apr 8, 2025Updated 11 months ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Jan 9, 2018Updated 8 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,477Jan 9, 2025Updated last year
- ☆182Nov 14, 2013Updated 12 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Golang based web service to scan files with yara rules☆25Jul 6, 2017Updated 8 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- ☆54Sep 10, 2016Updated 9 years ago