jadz / php-sploitsLinks
PHP Site vulnerable to basic XSS/SQL Injection
☆27Updated 4 years ago
Alternatives and similar repositories for php-sploits
Users that are interested in php-sploits are comparing it to the libraries listed below
Sorting:
- Automated XSS Finder☆63Updated 12 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆110Updated 3 months ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆97Updated 7 years ago
- Extension of sublister tool to check for subdomain takeovers☆23Updated 7 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆206Updated 7 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 5 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 8 years ago
- A Report Generation Tool for Security Assessment☆65Updated 7 years ago
- Simple PHP shell script, yet powerful enough.☆52Updated 8 years ago
- ❄️ Research project for SubFinder core API V2☆34Updated 7 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆165Updated 6 years ago
- ☆96Updated 8 years ago
- Small snippets of code we often find useful☆56Updated 10 years ago
- scripts for pentesting☆86Updated 7 years ago
- Summary & User Write-Ups of Hacky Easter 2019☆51Updated 5 years ago
- A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more☆168Updated 10 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆77Updated 6 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Updated 6 years ago
- Amazon bucket brute force tool☆102Updated 12 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆44Updated 5 years ago
- Homemade scripts to-do various vulnerable challenges☆78Updated 5 years ago
- Web interface for recon-ng☆14Updated 10 years ago
- ☆26Updated 9 years ago
- Amazon S3 bucket spelunking!☆87Updated 8 years ago
- Program to perform vulnerability analysis and automatically generate a report☆58Updated 3 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- ☆23Updated 7 years ago
- Damn Vulnerable File Upload V 1.1☆102Updated 7 years ago
- Scout - a Contactless Active Reconnaissance Tool☆56Updated 3 years ago
- ☆53Updated 5 years ago