jcesarstef / dotdotslashLinks
Search for Directory Traversal Vulnerabilities
☆445Updated last year
Alternatives and similar repositories for dotdotslash
Users that are interested in dotdotslash are comparing it to the libraries listed below
Sorting:
- kadimus is a tool to check and exploit lfi vulnerability.☆537Updated 4 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,088Updated 6 months ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆551Updated 2 years ago
- Multi Tool Subdomain Enumeration☆725Updated 4 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,241Updated last year
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆554Updated 2 years ago
- Finds unknown classes of injection vulnerabilities☆687Updated last month
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆723Updated 6 years ago
- Subdomain Takeover Scanner | Subdomain Takeover Tool | by 0x94☆363Updated 2 years ago
- JShell - Get a JavaScript shell with XSS.☆526Updated 6 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆633Updated 6 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆333Updated 4 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆469Updated 5 years ago
- A Powerful Subdomain Takeover Tool☆953Updated last year
- A small tool that extracts relative URLs from a file.☆748Updated 4 years ago
- This tool can be used to brute discover GET and POST parameters☆1,374Updated 5 years ago
- Repository for hosting my research papers☆509Updated last year
- This repository contains all the supplement material for the book "The art of sub-domain enumeration"☆648Updated 6 years ago
- HTTP file upload scanner for Burp Proxy☆488Updated last year
- Wordlists that have been compiled using Commonspeak2. This repo is updated every time new wordlists are generated.☆534Updated 6 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆436Updated 3 years ago
- A script to enumerate virtual hosts on a server.☆691Updated 7 years ago
- ☆815Updated last year
- A Burp Suite Pro extension which augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by caus…☆433Updated 2 months ago
- TheftFuzzer is a tool that fuzzes Cross-Origin Resource Sharing implementations for common misconfigurations.☆315Updated 2 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆729Updated last year
- Open Redirect Payloads☆621Updated 8 months ago
- ☆265Updated 6 years ago
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆1,009Updated 4 years ago
- Local file inclusion exploitation tool☆870Updated last year