qazbnm456 / VWGenLinks
Vulnerable Web applications Generator
☆84Updated 8 years ago
Alternatives and similar repositories for VWGen
Users that are interested in VWGen are comparing it to the libraries listed below
Sorting:
- Very crude and poorly written HTTP(s) and SMTP bin☆94Updated 4 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- ☆61Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 9 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Updated 2 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Puny Domain Name Check☆37Updated 6 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆104Updated 8 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆59Updated 7 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- ☆122Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆58Updated 8 years ago
- ☆92Updated 7 years ago
- A Github organization reconnaissance tool.☆218Updated 2 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆247Updated 11 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Updated 9 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 8 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆107Updated 11 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆73Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- CyberCrowl is a python Web path scanner tool☆25Updated 6 years ago