Search for Directory Traversal Vulnerabilities
☆458Jan 11, 2026Updated last month
Alternatives and similar repositories for dotdotslash
Users that are interested in dotdotslash are comparing it to the libraries listed below
Sorting:
- Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layer…☆46Jul 13, 2018Updated 7 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,914Apr 13, 2022Updated 3 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- This tool can be used to brute discover GET and POST parameters☆1,394Aug 24, 2019Updated 6 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆389Mar 3, 2025Updated last year
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Sep 23, 2024Updated last year
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆272Mar 24, 2021Updated 4 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆562Aug 17, 2020Updated 5 years ago
- Easy way to brute-force web directory.☆161Jun 2, 2019Updated 6 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,297Dec 23, 2018Updated 7 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆982Aug 1, 2023Updated 2 years ago
- ☆63Mar 21, 2018Updated 7 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- Drupal enumeration & exploitation tool☆612Nov 4, 2020Updated 5 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆305Oct 14, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Hawkeye filesystem analysis tool☆242Jul 21, 2018Updated 7 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆469Nov 14, 2019Updated 6 years ago
- A Powerful Subdomain Takeover Tool☆964Oct 17, 2023Updated 2 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,997Dec 11, 2025Updated 2 months ago
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- Bodhi - Client-side Vulnerability Playground☆123Jun 1, 2021Updated 4 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,285Aug 18, 2025Updated 6 months ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- ☆66Feb 10, 2018Updated 8 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆322Feb 7, 2018Updated 8 years ago
- Vulnerability scanner based on vulners.com search API☆883Oct 1, 2025Updated 5 months ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,244Jan 8, 2026Updated last month
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago