PHP Secure Configuration Checker
☆820Feb 24, 2026Updated last month
Alternatives and similar repositories for pcc
Users that are interested in pcc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Detect potentially malicious PHP files☆1,476Oct 20, 2023Updated 2 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Jan 28, 2018Updated 8 years ago
- ☆231Nov 18, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of curated Java Deserialization Exploits☆591May 16, 2021Updated 4 years ago
- Collection of CTF Web challenges I made☆2,824Aug 31, 2025Updated 6 months ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- SQL Vulnerability Scanner☆980Jan 11, 2018Updated 8 years ago
- ☆733Aug 16, 2022Updated 3 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- Multi-language web CGI interfaces exploits.☆399Aug 22, 2022Updated 3 years ago
- Advanced Web Shell☆580May 1, 2017Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆223Oct 16, 2023Updated 2 years ago
- A php.ini scanner for best security practices☆1,473May 31, 2023Updated 2 years ago
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- Php Codz Hacking☆669Sep 5, 2015Updated 10 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆46Jan 25, 2016Updated 10 years ago
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,775Sep 29, 2025Updated 5 months ago
- Security-related PHP7 OPcache abuse tools and demo☆316Jan 2, 2023Updated 3 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,516Jan 21, 2020Updated 6 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆985Dec 13, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- SSRF (Server Side Request Forgery) testing resources☆2,482Oct 12, 2024Updated last year
- Miscellaneous exploit code☆1,570Oct 6, 2023Updated 2 years ago
- CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability☆332Dec 30, 2018Updated 7 years ago
- SRCMS企业应急响应与缺陷管理系统☆303Oct 11, 2019Updated 6 years ago
- PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container☆406Feb 27, 2023Updated 3 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ✍️ A curated list of CVE PoCs.☆3,483Jan 4, 2022Updated 4 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- A lightweight CSRF Toolkit for easy Proof of concept☆172Jun 11, 2014Updated 11 years ago
- SHELLING - a comprehensive OS command injection payload generator☆447Mar 16, 2020Updated 6 years ago
- Web Application Security☆131Jan 6, 2026Updated 2 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,907Sep 27, 2021Updated 4 years ago
- A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.☆549Jun 12, 2017Updated 8 years ago