a mass web screenshot tool for mapping web networks.
☆24Apr 16, 2015Updated 10 years ago
Alternatives and similar repositories for wmap
Users that are interested in wmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple bash script that uses smbclient to test access to Windows file shares in automated fashion.☆18Jul 9, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- post-exploitation tools☆15Mar 27, 2018Updated 8 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Hashcat Bash Scripts for bulk hash file processing☆52Jul 2, 2016Updated 9 years ago
- Language-agnostic workflow builder. Modular code that goes from dev to prod in a minute with principled design decisions.☆13Mar 11, 2024Updated 2 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆81Jul 21, 2015Updated 10 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- DirBuster successor in Erlang☆37Feb 16, 2017Updated 9 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 11 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Feb 16, 2017Updated 9 years ago
- WHY?☆18Sep 4, 2016Updated 9 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Oct 27, 2013Updated 12 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Turn your Raspberry Pi into router☆26Mar 29, 2014Updated 12 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 12 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆97Aug 23, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A Python implementation of Crackstion's Hash Lookup☆26Jul 4, 2020Updated 5 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- System Status Probe☆22Jan 10, 2018Updated 8 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆21Nov 15, 2018Updated 7 years ago
- A DNS connectback shell executed by strings in payloads.txt☆104Sep 19, 2023Updated 2 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Apr 1, 2014Updated 12 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- RESTful interface to your operating system shell☆19Nov 8, 2017Updated 8 years ago
- Example signature files for drek.☆12Jan 10, 2018Updated 8 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago