rnehra01 / web-cheats
Exploit web-vulnerabilities
☆23Updated 5 years ago
Alternatives and similar repositories for web-cheats:
Users that are interested in web-cheats are comparing it to the libraries listed below
- Security Tool to detect arp poisoning attacks☆54Updated 6 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Updated 9 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆67Updated 7 years ago
- Writeups for different CTF challenges☆69Updated 9 months ago
- Tools of the trade☆84Updated 2 years ago
- ☆21Updated 3 years ago
- OWASP ZSC API http://api.z3r0d4y.com/v2☆9Updated 8 years ago
- ☆12Updated 9 years ago
- ☆9Updated 11 months ago
- My presentations from different conferences☆15Updated 6 years ago
- ☆25Updated 9 years ago
- Experiments in trying to find 0-days in numpy☆39Updated 7 years ago
- network security scripts and tips....☆14Updated 6 years ago
- CTF Writeups☆19Updated 7 years ago
- It deobfuscates JSFuck into readable JavaScript☆40Updated 6 years ago
- Hacking challenges☆32Updated 7 years ago
- ☆16Updated 6 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- The collection of all Python program from various CTF's☆25Updated 9 years ago
- This repo is all about myself coded exploit codes :)☆56Updated 5 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Stay on top of new domains! Bug bounty hunters can use this tool to receive Pushbullet notifications each time there is a new target subd…☆25Updated 6 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago