Generate and Permutate Context Aware Dictionaries for Application Testing
☆11Aug 16, 2016Updated 9 years ago
Alternatives and similar repositories for Basic-Expression-Lexicon-Variation-Algorithms-BELVA
Users that are interested in Basic-Expression-Lexicon-Variation-Algorithms-BELVA are comparing it to the libraries listed below
Sorting:
- Javascript deobfuscation tool☆17Apr 6, 2018Updated 7 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Feb 1, 2017Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆12Aug 22, 2025Updated 6 months ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Feb 13, 2017Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- orgleaks is a tool to run gitleaks for an organization.☆11Oct 19, 2021Updated 4 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Distributed parallelization of tasks☆41Jan 21, 2014Updated 12 years ago
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- a golang implementation of gauntlt☆12Oct 25, 2018Updated 7 years ago
- Adds a guard to disable ObjectInputStream.readObject☆11Dec 6, 2015Updated 10 years ago
- Another Instagram Bot☆12Jan 21, 2018Updated 8 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 6 months ago
- ☆11Sep 1, 2022Updated 3 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- pyzabbix☆11Jan 11, 2016Updated 10 years ago
- Various things to share☆11Sep 22, 2018Updated 7 years ago
- Fully undetected backdoor with RSA Encrypted shell☆11Jan 3, 2018Updated 8 years ago
- Stoplight -- An Input Validation Framework for Python☆15Apr 26, 2023Updated 2 years ago
- xCMDx monitors the clipboard for commands and prompts to execute when received.☆12Dec 16, 2017Updated 8 years ago
- A Pawn p-code interpreter written in C++☆25Oct 13, 2022Updated 3 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 4 months ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago