Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf
☆19Dec 20, 2023Updated 2 years ago
Alternatives and similar repositories for dfuf
Users that are interested in dfuf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 10 months ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated last month
- hello world in different languages☆10Feb 14, 2024Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- reverse engineered and improved BSQLi script from Coffinxp☆15Aug 30, 2024Updated last year
- Manage variables effectively when playing CTFs☆10Jul 26, 2025Updated 8 months ago
- some sploits☆19Sep 20, 2024Updated last year
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Dec 21, 2020Updated 5 years ago
- ☆19Jan 13, 2025Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 3 months ago
- A more reliable way of resolving syscall numbers in Windows☆54Feb 12, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- ☆22Jan 11, 2025Updated last year
- crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names fro…☆41Jun 22, 2024Updated last year
- ☆26Jun 5, 2024Updated last year
- Extract most frequent words in a list of subdomains☆13Feb 15, 2025Updated last year
- ☆12Jan 21, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago
- ☆15May 6, 2023Updated 2 years ago
- ☆14Mar 6, 2025Updated last year
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- ☆12Jun 8, 2018Updated 7 years ago
- A tool that can used for hacking :- reverse-shells, email-attacks, ip tracker and tracer.☆10Aug 3, 2022Updated 3 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆13Apr 14, 2024Updated last year
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 7 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- ☆13Sep 21, 2017Updated 8 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 11 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆44Dec 30, 2024Updated last year
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل☆15Aug 21, 2023Updated 2 years ago