This project is designed to enumerate back-end hosting Content Management Systems and aid security professionals in detecting vulnerabilities within them.
☆17Mar 14, 2017Updated 8 years ago
Alternatives and similar repositories for cmsDetector
Users that are interested in cmsDetector are comparing it to the libraries listed below
Sorting:
- Exploit laravel database config☆10Feb 10, 2019Updated 7 years ago
- Webdav Mass Exploiter With Python Programming Language☆13Jul 19, 2025Updated 7 months ago
- Mass IP Grabbbing From Bing | Mr.MaGnoM☆12Jun 6, 2018Updated 7 years ago
- 🌐 IP Tools Fast Sh*t ⚡️☆22Sep 16, 2021Updated 4 years ago
- Get database configuration from websites using laravel☆11Nov 19, 2017Updated 8 years ago
- ☆22May 13, 2019Updated 6 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆31Feb 19, 2019Updated 7 years ago
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- Auto CMS detector☆11Dec 29, 2017Updated 8 years ago
- Laravel PhpUnit Rce And Get Env Exploiter☆24Jun 30, 2019Updated 6 years ago
- Drupal Exploiter Tool (Drupal Hunter)☆37Apr 29, 2018Updated 7 years ago
- web shell,php shell ,bypass shell , web hack,symlink☆13May 15, 2019Updated 6 years ago
- ☆13Apr 19, 2019Updated 6 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- when i started web application security testing, i fall in love with web shell development and designed some PHP based web shells. This r…☆62Feb 17, 2018Updated 8 years ago
- Tools Auto Exploiter Plugin Revslider☆22Mar 20, 2024Updated last year
- Tor relay nearest neighbour ranking☆10Oct 18, 2021Updated 4 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Spur is a web based network configuration manager. It allows you to ssh or telnet to any networked device (cisco routers, linux hosts,etc…☆19Aug 7, 2012Updated 13 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Source code for the article "A bug story: data alignment on x86"☆17Nov 6, 2016Updated 9 years ago
- fsfuzzer mirror☆13May 8, 2017Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Submit commands to devices using ssh/telnet☆23Oct 29, 2015Updated 10 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- Web Crawler, Scanner, and Analyzer Framework (Shell-Script based)☆101Jun 20, 2019Updated 6 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 7 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- 投诉太狠啊,换个地方自己下吧☆14Jun 13, 2016Updated 9 years ago