A public list of URLs generally useful to webapp testers and pentesters
☆112Jun 5, 2017Updated 8 years ago
Alternatives and similar repositories for webappurls
Users that are interested in webappurls are comparing it to the libraries listed below
Sorting:
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- Unofficial Kali Documentation Project☆160Feb 27, 2015Updated 11 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Apr 22, 2015Updated 10 years ago
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆47May 27, 2017Updated 8 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆248Aug 12, 2014Updated 11 years ago
- PwnWiki - The notes section of the pentesters mind.☆564Oct 22, 2018Updated 7 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- HMAC timing attack's w/ statistical analysis☆23Sep 19, 2013Updated 12 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Operational toolset utilizing git's submodule feature☆57Feb 6, 2013Updated 13 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Jan 21, 2020Updated 6 years ago
- Probe a web server for common files and endpoints that are useful for gathering information or gaining a foothold.☆23May 20, 2014Updated 11 years ago
- A little Keylogger for Windows developed in C++☆20Jan 24, 2016Updated 10 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- A collection of scripts to explore domains and pick up information.☆13Sep 17, 2018Updated 7 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Binary analysis platform based on Octopus and Radare2☆78Nov 7, 2016Updated 9 years ago
- php-cli vulnerability scanner☆79Jun 29, 2015Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Aug 4, 2016Updated 9 years ago
- ☆49Mar 31, 2016Updated 9 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- ☆252Sep 18, 2019Updated 6 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago