qazbnm456 / VWGen
Vulnerable Web applications Generator
☆84Updated 7 years ago
Alternatives and similar repositories for VWGen:
Users that are interested in VWGen are comparing it to the libraries listed below
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆159Updated 8 years ago
- ☆92Updated 6 years ago
- Red Team Resources☆59Updated 6 years ago
- ☆61Updated 7 years ago
- A Github organization reconnaissance tool.☆216Updated last year
- unix wildcard attacks☆131Updated 6 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- Shodan HQ nmap plugin - passively scan targets☆152Updated 9 years ago
- Common Findings Database☆100Updated 5 years ago
- A regex based source code scanner.☆129Updated 7 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- ☆78Updated 9 years ago
- Tool for breaking into web applications.☆91Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆191Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 10 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆79Updated 9 months ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆165Updated last year
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Small CTF challenges running on Docker☆157Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago