jhaddix / ios_shLinks
ios source grepper
☆39Updated 8 years ago
Alternatives and similar repositories for ios_sh
Users that are interested in ios_sh are comparing it to the libraries listed below
Sorting:
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Usefull stuff from around teh internetz☆110Updated 7 years ago
- Scripts for Deploying new server☆48Updated 2 months ago
- Web Application Security☆127Updated last year
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago
- Exploit insecure crossdomain.xml files.☆26Updated 8 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 10 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆123Updated 7 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆157Updated 5 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆114Updated 6 years ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Updated 4 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆168Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 5 months ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- PwnWiki - The notes section of the pentesters mind.☆25Updated 11 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 10 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35Updated 6 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago