matrixleons / evilwafLinks
evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).
☆155Updated 3 weeks ago
Alternatives and similar repositories for evilwaf
Users that are interested in evilwaf are comparing it to the libraries listed below
Sorting:
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆112Updated 3 months ago
- ☆161Updated this week
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆142Updated 11 months ago
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆224Updated 2 weeks ago
- ☆318Updated this week
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆161Updated 9 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆223Updated 3 months ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆181Updated last year
- A blind SQL injection brute forcer☆113Updated 7 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆387Updated last month
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆53Updated 6 months ago
- Analyze Android native `.so` files☆114Updated 4 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆152Updated last month
- What the name says....☆104Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 8 months ago
- ☆133Updated 6 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆67Updated 4 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- NetProbe: Network Probe☆171Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 7 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆106Updated 3 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆238Updated last year
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆212Updated 3 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated 10 months ago
- A real fake social engineering app☆128Updated 5 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆134Updated 2 weeks ago
- IoT Camera Reconnaissance and Live Viewer☆168Updated last year
- ☆90Updated this week
- A collection of config files for linux focusing on hackthebox theme☆53Updated 2 months ago