kenb123 / Basic-Expression-Lexicon-Variation-Algorithms-BELVALinks
Generate and Permutate Context Aware Dictionaries for Application Testing
☆11Updated 8 years ago
Alternatives and similar repositories for Basic-Expression-Lexicon-Variation-Algorithms-BELVA
Users that are interested in Basic-Expression-Lexicon-Variation-Algorithms-BELVA are comparing it to the libraries listed below
Sorting:
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 9 years ago
- ☆32Updated 9 years ago
- ☆12Updated 8 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 2 months ago
- ☆25Updated 8 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- Office 365 MFA capture toolkit☆13Updated 7 years ago
- Pull author and committer names and emails from Travis-CI☆11Updated 4 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- Store Burp data and collaborate via git☆53Updated 5 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- A More or less Random Collection of Scripts for security Testing.☆65Updated 3 years ago
- A Custom Scanner for Burp☆30Updated 11 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- SMB Auto authentication Vulnerability☆34Updated 8 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- A vulnerability reporting database to help pentesters write consistent, easy reports.☆9Updated 9 years ago
- Generates several metasploit payloads☆15Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- ☆11Updated 8 years ago
- The documents☆56Updated 7 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆19Updated 9 years ago