koto / owasp-malicious-javascript
Materials for OWASP presentation on malicious JavaScript
☆15Updated 14 years ago
Alternatives and similar repositories for owasp-malicious-javascript:
Users that are interested in owasp-malicious-javascript are comparing it to the libraries listed below
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 8 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 8 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 7 years ago
- Some exploits for ZeroNights 0x03☆37Updated 9 years ago
- A web app scanner☆26Updated 11 years ago
- ☆27Updated 8 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 8 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Updated 10 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 6 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆50Updated 3 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Network white noise collector☆18Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆40Updated 2 years ago
- ARPER is an arp cache poisoning tool, it sends spoofed address resolution protocol messages onto a local area network. It has the abilit…☆8Updated 10 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- XSS Weaponization☆34Updated 11 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago