Web attack vectors collection
☆20Nov 1, 2020Updated 5 years ago
Alternatives and similar repositories for vulnwebcollection
Users that are interested in vulnwebcollection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code in…☆12Aug 21, 2022Updated 3 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆16May 21, 2022Updated 3 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Burp Intruder File Payload Generator☆18Oct 27, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Resources for Students in the Practical Webapp Security and Testing course☆23Oct 15, 2025Updated 6 months ago
- Reverse shell using socket programming in python☆15Dec 8, 2022Updated 3 years ago
- SQL Injection vulnerabilites can cause a lot of damage to a web application. A malicious user can possibly view records, delete records, …☆31Oct 8, 2013Updated 12 years ago
- Demo of the Newspaper article extraction library.☆29Nov 17, 2014Updated 11 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- ☆12Jan 30, 2025Updated last year
- A Django vulnerable Web application for testing the w3af framework☆32Jul 6, 2022Updated 3 years ago
- ☆13Jul 8, 2020Updated 5 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- automated web application vulnerability scanner☆42Mar 19, 2015Updated 11 years ago
- 亿赛通电子文档安全管理系统-/UploadFileFromClientServiceForClient 任意文件上传漏洞☆13Aug 15, 2023Updated 2 years ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆25Updated this week
- SMS4 Decrypt☆11Dec 23, 2020Updated 5 years ago
- ☆30Dec 23, 2020Updated 5 years ago
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- 这里存放的是我们团队做CTF题目的时候经常用到的一些工具☆11Nov 5, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Maltego transforms for the Steam community☆12Aug 5, 2017Updated 8 years ago
- WPA/WPA2 PSK password cracking python script with a known PMKID☆22Sep 24, 2023Updated 2 years ago
- 应急响应辅助工具,根据样本hash 全盘检索☆12Sep 10, 2021Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- IIS PUT WebDAV GetShell Exploit☆18Aug 15, 2020Updated 5 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Oct 1, 2021Updated 4 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- 未授权批量检测脚本☆14Oct 9, 2019Updated 6 years ago
- ☆11Apr 23, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 整理SQLI、XSS、RCE、Path的payload文件备份留存☆15Nov 9, 2022Updated 3 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆36Mar 1, 2020Updated 6 years ago
- 内网渗透、工具开发、二进制等相关笔记☆12Mar 26, 2023Updated 3 years ago
- Pwnage☆17Jul 1, 2025Updated 10 months ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- two strange things to do with neural nets☆15Feb 18, 2019Updated 7 years ago
- Unencrypted, UDP-based alternative to the Gemini protocol☆19Sep 20, 2024Updated last year