A place for scripts that describe web exploits to live so they can be used in testing
☆20Mar 11, 2013Updated 13 years ago
Alternatives and similar repositories for Websploit-Tests
Users that are interested in Websploit-Tests are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All-in-One WebSploit Installer for Android Devices (Termux) Created by @Voldemort1912☆12Feb 20, 2019Updated 7 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 14 years ago
- Web Application Exploitation Environment☆11Jun 27, 2018Updated 7 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 7 months ago
- 暴力检测一些qq企业邮箱弱口令的用户 。以提醒他们修改密码☆13Nov 25, 2015Updated 10 years ago
- 思考与总结☆10Feb 18, 2016Updated 10 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Simple python script to scan some weak things.☆14Nov 2, 2015Updated 10 years ago
- 绿盟远程评估扫描器报告自动整理,扫描,排列☆17Jul 11, 2018Updated 7 years ago
- phpstudy批量检测mysql弱口令☆20Dec 2, 2015Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- joomla 反序列化漏洞 getshell EXP,感觉别人的用着不太对,所以自己动手造了一个☆15Dec 17, 2015Updated 10 years ago
- Internet mapping artware☆24Nov 3, 2016Updated 9 years ago
- experiments in SDR-based pseudo-doppler direction finding☆24Jan 9, 2023Updated 3 years ago
- ☆26May 14, 2013Updated 12 years ago
- PyCommands for Immunity Debugger☆29Mar 30, 2013Updated 12 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆10Oct 5, 2015Updated 10 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- Android for Boundary Devices platforms☆13Sep 10, 2025Updated 6 months ago
- EQGRP-Free-Files here.,☆46Aug 16, 2016Updated 9 years ago
- Convert internet traffic to music.☆23Feb 22, 2014Updated 12 years ago
- A serious attempt to implement multi-threading to nmap module, which would result in faster scanning speed. I know that one can write NSE…☆27Oct 13, 2018Updated 7 years ago
- omron工控设备漏洞批量验证☆31Dec 17, 2015Updated 10 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- Intelligent URL parser☆16Oct 25, 2019Updated 6 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- a poc framework to test hosts via zoomeye sdk☆32Jun 26, 2017Updated 8 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- MIDI Breakout Board by ubld.it☆15Sep 20, 2020Updated 5 years ago
- A generic, simple, easy to use User Interface for Arduino☆14Feb 3, 2015Updated 11 years ago