mandatoryprogrammer / wmapLinks
a mass web screenshot tool for mapping web networks.
☆24Updated 10 years ago
Alternatives and similar repositories for wmap
Users that are interested in wmap are comparing it to the libraries listed below
Sorting:
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Dynamic DNS Update Bruteforce Tool☆29Updated 8 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Scans crossdomain.xml policies for expired domain names.☆25Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- ☆27Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- Websocket based egress tester☆20Updated 8 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆16Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- ☆15Updated 8 years ago
- Demo server for testing Java deserialization payloads☆15Updated 8 years ago
- A symbolic execution engine for the VEX IR☆9Updated 9 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago