jadz / php-sploitsLinks
PHP Site vulnerable to basic XSS/SQL Injection
☆27Updated 4 years ago
Alternatives and similar repositories for php-sploits
Users that are interested in php-sploits are comparing it to the libraries listed below
Sorting:
- Scans a list of websites for Cloudfront or S3 Buckets☆106Updated 2 months ago
- Automated XSS Finder☆63Updated 12 years ago
- Extension of sublister tool to check for subdomain takeovers☆22Updated 7 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 5 years ago
- Simple PHP shell script, yet powerful enough.☆52Updated 8 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆97Updated 6 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 8 years ago
- A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more☆169Updated 10 years ago
- Amazon S3 bucket spelunking!☆87Updated 8 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 7 years ago
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- The Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting …☆86Updated 8 years ago
- Code repository for Mastering Modern Web Penetration Testing, published by Packt☆72Updated 2 years ago
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- ☆96Updated 7 years ago
- Automatically exported from code.google.com/p/lfimap☆16Updated 9 years ago
- Small snippets of code we often find useful☆56Updated 10 years ago
- Auto Updater Joomla Components and Exploits Scanner☆27Updated 7 years ago
- Actarus is a custom tool for bug bounty☆77Updated 6 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆124Updated 5 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 8 months ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- CyberCrowl is a python Web path scanner tool☆25Updated 6 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆165Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97Updated 7 years ago
- Program to perform vulnerability analysis and automatically generate a report☆57Updated 3 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Updated 5 years ago