Unicode encoding attacks with machine learning
☆98Nov 25, 2021Updated 4 years ago
Alternatives and similar repositories for uriDeep
Users that are interested in uriDeep are comparing it to the libraries listed below
Sorting:
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Search (offline) if your password (NTLM or SHA1 format) has been leaked (HIBP passwords list v8)☆61Sep 11, 2024Updated last year
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last week
- wp-file-manager 6.7 (Aug 2020) Wordpress Plugin 0day - Remote Code Execution☆75Oct 9, 2020Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 5 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- ☆17Jan 2, 2020Updated 6 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- ☆25Aug 11, 2020Updated 5 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Nov 13, 2020Updated 5 years ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 2 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- reads a list of IP ranges in CIDR notation and prints the individual IP addresses.☆14Oct 6, 2016Updated 9 years ago
- Tool to automate the whole process of environment in android audits☆14Apr 30, 2019Updated 6 years ago
- ☆14Mar 20, 2025Updated last year
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆180Apr 25, 2020Updated 5 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆172Nov 17, 2021Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Python script to find URLs that could contain secrets☆13Apr 28, 2021Updated 4 years ago
- Pelatihan Software House HMTC ITS☆12May 7, 2021Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated this week
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Dec 10, 2024Updated last year
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated last month
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- A tool to do basic fingerprinting across a large number of hosts☆11Oct 20, 2020Updated 5 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Aug 19, 2022Updated 3 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago