Tool to generate csrf payloads based on vulnerable requests
☆64Oct 9, 2020Updated 5 years ago
Alternatives and similar repositories for CSRFER
Users that are interested in CSRFER are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Automated rogue access point setup tool.☆204Apr 2, 2021Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Unicode encoding attacks with machine learning☆98Nov 25, 2021Updated 4 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- Github action for Slither Static Analyser for Solidity smart contracts☆15Feb 19, 2022Updated 4 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Apr 20, 2021Updated 4 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Web Recon & Exploitation Tool.☆55Mar 8, 2020Updated 6 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnel☆41Feb 15, 2026Updated last month
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26May 8, 2020Updated 5 years ago
- Web Application Vulnerability Scanner☆133Sep 25, 2020Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Fast offline auditing of Active Directory passwords using Python.☆166Aug 14, 2024Updated last year
- It's a simple tool for test vulnerability shellshock☆119Mar 18, 2021Updated 5 years ago
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- Search (offline) if your password (NTLM or SHA1 format) has been leaked (HIBP passwords list v8)☆61Sep 11, 2024Updated last year
- A network scanner tool, developed in Python 3 using scapy.☆137Mar 1, 2026Updated 3 weeks ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- NERVE Continuous Vulnerability Scanner☆456Dec 6, 2023Updated 2 years ago
- A Linux enumeration script for Hack The Box☆191Nov 27, 2019Updated 6 years ago
- Web-based check for Windows privesc vulnerabilities☆139May 14, 2023Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago