PHP Site vulnerable to basic XSS/SQL Injection
☆27Jul 14, 2021Updated 4 years ago
Alternatives and similar repositories for php-sploits
Users that are interested in php-sploits are comparing it to the libraries listed below
Sorting:
- The Pentester's Swiss Army Knife☆26Jan 25, 2020Updated 6 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- Rekall is an endpoint security solution.☆38Feb 12, 2018Updated 8 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Code + Online Judge : Coding made sohoj☆10Dec 25, 2025Updated 2 months ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 5 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 11 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- A STUN server in Java with no dependencies☆11Jan 16, 2017Updated 9 years ago
- A library to parse Wayback Machine of archive.org to get a historical views of web pages. It is a useful tool to research on the evolutio…☆20Dec 22, 2018Updated 7 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- NodeRED made for balena☆13Jun 1, 2021Updated 4 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated last month
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- ☆11Dec 21, 2016Updated 9 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Elasticsearch to CSV Python Script☆11Jan 28, 2014Updated 12 years ago
- Scripts used in our HackWest Pros vs Joes event☆14Mar 26, 2018Updated 7 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- A realistic windows testlab deployment tool☆12Feb 24, 2017Updated 9 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Python script for privilege escalation for Python☆11Jun 5, 2020Updated 5 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 7 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- Go library MalShare API☆13Apr 29, 2019Updated 6 years ago
- ☆14May 23, 2018Updated 7 years ago
- Vue.js | Vuex App "Shopping Cart" 🛒🏷️☆17Apr 23, 2024Updated last year