onurkarasalihoglu / Pentest-Tools
☆55Updated 7 years ago
Alternatives and similar repositories for Pentest-Tools:
Users that are interested in Pentest-Tools are comparing it to the libraries listed below
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 7 years ago
- ☆91Updated 2 years ago
- Brute forcer and shell deployer for WildFly☆100Updated 6 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- ☆21Updated 8 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- OWASP Skanda - SSRF Exploitation Framework☆37Updated 11 years ago
- ☆26Updated 8 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆22Updated 6 years ago
- ☆70Updated 7 years ago
- A collection of scripts used to interact with the Burp Rest API☆51Updated 6 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆44Updated 11 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆70Updated 4 years ago
- This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP…☆46Updated 5 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Advanced XPath Injection Tool☆34Updated 9 years ago
- Scripts for Deploying new server☆48Updated 6 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆47Updated 2 years ago
- WhiteBox CMS analysis☆69Updated last year
- Updated version of SWFIntruder☆26Updated 8 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 7 years ago
- XSS Payloads☆49Updated 9 years ago
- Pillage a git repo found in an accessible web root☆60Updated 13 years ago