lanjelot / albatar
Albatar is a SQLi exploitation framework in Python
☆135Updated 2 months ago
Alternatives and similar repositories for albatar:
Users that are interested in albatar are comparing it to the libraries listed below
- XSS Hunter Burp Plugin☆149Updated 6 years ago
- ☆120Updated 7 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆133Updated last year
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆138Updated 5 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆154Updated this week
- subdomain bruteforce list☆101Updated 5 months ago
- Local File Inclusion Exploitation Tool (mirror)☆123Updated 8 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 6 years ago
- Repo of useful scripts☆104Updated 4 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆72Updated 6 years ago
- Various Payload wordlists☆235Updated 4 years ago
- ☆128Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆101Updated last year
- Push notifications for passive DNS data☆108Updated 8 years ago
- ☆29Updated 3 years ago
- An interactive OOB XXE data exfiltration tool☆91Updated 7 years ago
- SHELLING - a comprehensive OS command injection payload generator☆108Updated 5 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆202Updated last year
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- Brute force AWS bucket finder☆61Updated 2 years ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 6 years ago
- Automatically exported from code.google.com/p/fuzzdb☆61Updated 2 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆75Updated 5 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated last year
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Proof of concept for CVE-2020-5902☆72Updated 4 years ago