mandatoryprogrammer / PERSLinks
A passive scanning tool for finding expired domain vulnerabilities while you browse.
☆41Updated 6 years ago
Alternatives and similar repositories for PERS
Users that are interested in PERS are comparing it to the libraries listed below
Sorting:
- Scans crossdomain.xml policies for expired domain names.☆25Updated 9 years ago
- Dynamic DNS Update Bruteforce Tool☆29Updated 8 years ago
- A tool for enumerating expired domains in CNAME records☆59Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Simple, hand-picked list of fuzz strings☆33Updated 8 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆46Updated 3 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Recursively searches a directory for any file containing a specified string☆45Updated 10 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 7 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 6 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆80Updated 10 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- Weape-Wireless-EAP-Extractor☆29Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Scripts for Deploying new server☆48Updated 3 months ago
- Exploits and research stuffs☆55Updated last year
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- The Bi-directional Link Extractor.☆53Updated 8 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Updated 13 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- Quick and dirty scripts that don't really belong in a larger project☆34Updated 5 months ago