Pown Proxy is a versatile web application security testing proxy with cool TUI features.
☆60May 16, 2019Updated 6 years ago
Alternatives and similar repositories for proxy
Users that are interested in proxy are comparing it to the libraries listed below
Sorting:
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- DNS based ad blocker with DNS over HTTPS support.☆24Jun 9, 2020Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Mar 21, 2018Updated 7 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- 👾 Run commands inside docker containers to keep your OS untouched using bash alias☆25Apr 19, 2020Updated 5 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Aug 11, 2021Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆261Apr 7, 2023Updated 2 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- HTMLie is a command line HTML Parser.☆13Aug 6, 2019Updated 6 years ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- General repository for everything techtime.☆14Jun 21, 2024Updated last year
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 7 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- A terminal recorder that produces files capable of efficient random access☆14Nov 17, 2019Updated 6 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- A Docker project template generator written in Rust☆38Mar 18, 2025Updated 11 months ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- OpenFaaS CRUD sample with a Postgres backend and GitHub emojis as input.☆16Mar 26, 2020Updated 5 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Aug 17, 2018Updated 7 years ago
- Micro framework for writings apps on ESP-IDF connected to Google Cloud Platform☆20Feb 24, 2021Updated 5 years ago
- Yet Another Vulnerability Database☆16Jul 23, 2021Updated 4 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- Burp Suite Attack Selector Plugin☆60Nov 23, 2017Updated 8 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago