kenb123 / Basic-Expression-Lexicon-Variation-Algorithms-BELVA
Generate and Permutate Context Aware Dictionaries for Application Testing
☆11Updated 8 years ago
Alternatives and similar repositories for Basic-Expression-Lexicon-Variation-Algorithms-BELVA:
Users that are interested in Basic-Expression-Lexicon-Variation-Algorithms-BELVA are comparing it to the libraries listed below
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- ☆12Updated 7 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- A vulnerability reporting database to help pentesters write consistent, easy reports.☆9Updated 9 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- ☆25Updated 8 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- Pull author and committer names and emails from Travis-CI☆11Updated 4 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- ☆32Updated 9 years ago
- Mass zone transfer python script☆15Updated 8 years ago
- Issues to consider when planning a red team exercise.☆15Updated 7 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Store Burp data and collaborate via git☆53Updated 5 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 7 years ago
- Beagle(bone) in the Middle☆25Updated 4 years ago
- Scripts that I've written that others may find useful☆14Updated 2 years ago
- ☆13Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- ☆16Updated 7 years ago
- A tool for calculating necessary SQL Server permissions☆24Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆43Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago