jadz / php-sploitsLinks
PHP Site vulnerable to basic XSS/SQL Injection
☆27Updated 4 years ago
Alternatives and similar repositories for php-sploits
Users that are interested in php-sploits are comparing it to the libraries listed below
Sorting:
- A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more☆168Updated 10 years ago
- Automated XSS Finder☆63Updated 12 years ago
- Extension of sublister tool to check for subdomain takeovers☆23Updated 7 years ago
- A Report Generation Tool for Security Assessment☆65Updated 7 years ago
- A tool to generate media files with malicious metadata☆129Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 7 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 3 years ago
- A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (crypto…☆205Updated 3 years ago
- CyberCrowl is a python Web path scanner tool☆24Updated 7 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Program to perform vulnerability analysis and automatically generate a report☆58Updated 3 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Updated 10 years ago
- Auto Updater Joomla Components and Exploits Scanner☆27Updated 7 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 8 years ago
- ADAPT is a tool that performs automated Penetration Testing for WebApps.☆193Updated 6 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 9 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97Updated 7 years ago
- OverTheWire Wargames write-ups☆24Updated 8 years ago
- Damn Vulnerable File Upload V 1.1☆102Updated 7 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆32Updated 8 years ago
- ☆26Updated 9 years ago
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- Amazon bucket brute force tool☆102Updated 12 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆166Updated 6 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆36Updated 5 years ago
- Human and machine readable web vulnerability testing format☆194Updated 3 years ago
- Small snippets of code we often find useful☆56Updated 10 years ago
- Tool to automatic leak information using Hacking with engine searches☆93Updated 7 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago