ncrocfer / csr2f
CSR2F is a Python tool used for generating CSRF (Cross-Site Request Forgery) exploits
☆13Updated 5 years ago
Alternatives and similar repositories for csr2f
Users that are interested in csr2f are comparing it to the libraries listed below
Sorting:
- ☆19Updated 10 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- Python backdoor that uses http post/get requests to communicate☆40Updated 8 years ago
- Download files out of open AWS buckets☆38Updated 6 years ago
- [Python] Google Scraper & Mass Exploiter☆29Updated 3 years ago
- Python SQL injection framework☆133Updated 3 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Docker repository for OWTF (64-bit Kali)☆33Updated 5 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- Determine everything you need to know to about a system☆32Updated 6 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Updated 13 years ago
- Masscan integrated with Shodan API☆41Updated 7 years ago
- Twintelligence is a free Twitter OSINT tool☆51Updated 4 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆35Updated 6 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- A web crawler oriented to infosec.☆23Updated last year
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Dynamic DNS Update Bruteforce Tool☆29Updated 8 years ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 3 years ago
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆31Updated 9 years ago