lokifer / BlindElephantLinks
Getting BlindElephant into a working state, and updating the plugin files
☆80Updated 5 years ago
Alternatives and similar repositories for BlindElephant
Users that are interested in BlindElephant are comparing it to the libraries listed below
Sorting:
- Python code to query the Censys public scan database.☆152Updated 4 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Updated 8 years ago
- Some works on Nmap Scripts (NSE)☆87Updated last year
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆139Updated 4 years ago
- Burp Suite Extensions☆129Updated 12 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 3 years ago
- Advanced web server fingerprinting for Nmap☆131Updated 8 years ago
- XSS Payloads☆49Updated 9 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆219Updated last year
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆164Updated 4 years ago
- Automated Python Code Injection Tool☆88Updated 3 years ago
- OWASP Skanda - SSRF Exploitation Framework☆37Updated 12 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- CMS Scanner Framework☆129Updated 4 months ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆27Updated 8 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆49Updated 3 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆173Updated 11 years ago
- A collection of web pages, vulnerable to command injection flaws.☆179Updated 2 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 10 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆81Updated 2 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆225Updated last year
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Updated 6 years ago
- This python script is developed to show, how many vulnerables websites, which are laying around on the web. 1) Scan net for urls prone to…☆54Updated 8 years ago
- A JBoss script for obtaining remote shell access☆176Updated 5 years ago
- Various tools for managing bug bounty recon and exploration.☆48Updated 2 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Updated 9 years ago