juliocesarfort / crossdomainerLinks
Flash crossdomain policy security checker
☆26Updated 9 years ago
Alternatives and similar repositories for crossdomainer
Users that are interested in crossdomainer are comparing it to the libraries listed below
Sorting:
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- ☆25Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- ☆33Updated 10 years ago
- Windows Privesc Check☆20Updated 11 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Vulnerable Grails application☆43Updated 10 years ago
- A Custom Scanner for Burp☆31Updated 11 years ago
- BurpJDSer-ng☆29Updated last week
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- ☆17Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 10 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago