maK- / scanomalyLinks
Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited
☆13Updated last year
Alternatives and similar repositories for scanomaly
Users that are interested in scanomaly are comparing it to the libraries listed below
Sorting:
- ☆36Updated last year
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- ☆26Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- DO NOT RUN THIS.☆47Updated 4 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 4 years ago
- ☆33Updated last year
- an Evil Java RMI Registry.☆51Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 4 years ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 5 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Updated 5 years ago
- ☆16Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆53Updated 2 years ago
- A web shell for pivoting and lateral movement☆33Updated 8 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Updated 4 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- ☆54Updated 4 years ago
- Stay within program scope☆37Updated 3 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago