mandatoryprogrammer / PERSLinks
A passive scanning tool for finding expired domain vulnerabilities while you browse.
☆41Updated 6 years ago
Alternatives and similar repositories for PERS
Users that are interested in PERS are comparing it to the libraries listed below
Sorting:
- Dynamic DNS Update Bruteforce Tool☆29Updated 8 years ago
- Scans crossdomain.xml policies for expired domain names.☆25Updated 10 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- A tool for enumerating expired domains in CNAME records☆59Updated 9 years ago
- Simple, hand-picked list of fuzz strings☆33Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Recursively searches a directory for any file containing a specified string☆46Updated 10 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- unix wildcard attacks☆135Updated 7 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- Burp Scanner XML Parser☆36Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 5 years ago
- Operational toolset utilizing git's submodule feature☆57Updated 12 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Some of my Nmap scripts☆21Updated 8 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 5 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Collection of tools for privesc on Linux☆34Updated 11 years ago
- WebApp for BugBounty Hunters☆14Updated 8 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago
- The Bi-directional Link Extractor.☆53Updated 8 years ago
- Quick and dirty scripts that don't really belong in a larger project☆34Updated 5 months ago