kostas-pa / LFITesterLinks
LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.
☆109Updated 6 months ago
Alternatives and similar repositories for LFITester
Users that are interested in LFITester are comparing it to the libraries listed below
Sorting:
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆94Updated last year
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆54Updated 3 months ago
- ☆74Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆103Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆123Updated 9 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 10 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 9 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 11 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 11 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Web Hacking and Red Teaming MindMap☆74Updated 2 years ago
- ☆64Updated 2 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆110Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆150Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated last week
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆86Updated 11 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆68Updated 9 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆73Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated 4 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆87Updated last year
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Updated 3 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆21Updated 2 months ago