mandatoryprogrammer / PERSLinks
A passive scanning tool for finding expired domain vulnerabilities while you browse.
☆41Updated 6 years ago
Alternatives and similar repositories for PERS
Users that are interested in PERS are comparing it to the libraries listed below
Sorting:
- Scans crossdomain.xml policies for expired domain names.☆25Updated 10 years ago
- Dynamic DNS Update Bruteforce Tool☆29Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- A tool for enumerating expired domains in CNAME records☆59Updated 9 years ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 7 years ago
- Simple, hand-picked list of fuzz strings☆34Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- Burp Scanner XML Parser☆36Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆39Updated 8 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 9 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 11 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 6 years ago
- Web shells for use in penetration testing☆40Updated 10 years ago
- WebApp for BugBounty Hunters☆14Updated 8 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- The Bi-directional Link Extractor.☆53Updated 8 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆96Updated 5 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Quick and dirty scripts that don't really belong in a larger project☆34Updated this week
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 9 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 11 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 9 years ago