qazbnm456 / VWGenLinks
Vulnerable Web applications Generator
☆84Updated 7 years ago
Alternatives and similar repositories for VWGen
Users that are interested in VWGen are comparing it to the libraries listed below
Sorting:
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- ☆92Updated 6 years ago
- Common Findings Database☆100Updated 5 years ago
- unix wildcard attacks☆133Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Red Team Resources☆60Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 8 years ago
- Tool for breaking into web applications.☆91Updated 5 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- Shodan HQ nmap plugin - passively scan targets☆155Updated 9 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- ☆90Updated 5 months ago
- Check UNIX/Linux systems for privilege escalation☆124Updated 9 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- ☆78Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago