Search for Directory Traversal Vulnerabilities
☆461Jan 11, 2026Updated 2 months ago
Alternatives and similar repositories for dotdotslash
Users that are interested in dotdotslash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layer…☆46Jul 13, 2018Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,920Apr 13, 2022Updated 3 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆271Mar 24, 2021Updated 5 years ago
- Easy way to brute-force web directory.☆161Jun 2, 2019Updated 6 years ago
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- ☆63Mar 21, 2018Updated 8 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆389Mar 3, 2025Updated last year
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆565Aug 17, 2020Updated 5 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆991Aug 1, 2023Updated 2 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,297Dec 23, 2018Updated 7 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆305Oct 14, 2018Updated 7 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Sep 23, 2024Updated last year
- A Powerful Subdomain Takeover Tool☆962Oct 17, 2023Updated 2 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆471Nov 14, 2019Updated 6 years ago
- Drupal enumeration & exploitation tool☆610Nov 4, 2020Updated 5 years ago
- ☆66Feb 10, 2018Updated 8 years ago
- Windows passwords decryption from dump files☆513Feb 2, 2023Updated 3 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Feb 7, 2018Updated 8 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆3,022Dec 11, 2025Updated 3 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Hawkeye filesystem analysis tool☆242Jul 21, 2018Updated 7 years ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Extreme Vulnerable Node Application☆95Nov 12, 2018Updated 7 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159May 1, 2024Updated last year
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,250Jan 8, 2026Updated 2 months ago
- Penetration testing and auditing toolkit for Android apps.☆247Mar 8, 2025Updated last year
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- Vulnerability scanner based on vulners.com search API☆887Oct 1, 2025Updated 5 months ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,195Oct 24, 2018Updated 7 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆265Nov 18, 2021Updated 4 years ago