koto / owasp-malicious-javascript
Materials for OWASP presentation on malicious JavaScript
☆15Updated 14 years ago
Related projects: ⓘ
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 9 years ago
- ☆27Updated 8 years ago
- ☆17Updated this week
- Virtual host brute forcer☆22Updated 10 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- Go command line app to exploit file upload vulnerability☆12Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- ☆14Updated this week
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 7 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- ☆11Updated this week
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆17Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Automated install process for Phishing Frenzy☆23Updated 9 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆16Updated 8 years ago
- Format string exploit generation☆9Updated 9 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Search bing with python☆11Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 7 years ago
- ☆22Updated this week
- Basic file metadata gathering script☆21Updated 2 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- firewall port testing tool☆12Updated 6 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- ☆33Updated this week
- Automatically exported from code.google.com/p/fuzzdb☆14Updated 9 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 8 years ago