null-- / what-the-wafLinks
Try harder to bypass that WAF...
☆13Updated 10 years ago
Alternatives and similar repositories for what-the-waf
Users that are interested in what-the-waf are comparing it to the libraries listed below
Sorting:
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Updated 7 years ago
- Remote Desktop Protocol in Twisted Python☆26Updated 7 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- Juniper backdoor☆13Updated 9 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- ☆20Updated last year
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Generates a MSF Reverse TCP RC4 payload encoded in Powershell to the clipboard☆9Updated 8 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- PoC ActiveX SVG Document Execution☆21Updated 6 years ago
- Win32k Elevation of Privilege Poc☆24Updated 6 years ago
- ☆14Updated 7 years ago
- Projects and POCs☆60Updated 10 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- CVE-2018-6546-Exploit☆41Updated 7 years ago
- Advance URL Fuzzing + Whois Domain running on python☆17Updated 2 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 5 years ago
- ☆18Updated 6 years ago