sensepost / wikto
Nikto for Windows with some extra features.
☆175Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for wikto
- Passive Vulnerability Auditor☆128Updated 8 years ago
- Automates some pentest jobs via nmap xml file☆322Updated 6 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆267Updated 9 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆167Updated 9 months ago
- search for hosts info with shodan☆228Updated 3 years ago
- A Blind SQL Exploitation application☆79Updated 12 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- A tool to generate media files with malicious metadata☆124Updated 5 years ago
- Exploits and Security Tools Framework 2.0.1☆304Updated 2 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆277Updated 3 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆94Updated last year
- Check for valid credentials across a network over SMB☆256Updated 10 months ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆162Updated 3 years ago
- Automated digital reconnaissance☆193Updated last year
- ☆235Updated 5 years ago
- ☆191Updated 6 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆215Updated 6 years ago
- Penetration testing scripts☆143Updated 6 years ago
- First IDE for Nmap Script (NSE) Development.☆355Updated 4 years ago
- ☆179Updated 11 years ago
- Web Application Security☆124Updated 5 months ago
- A ton of helpful tools☆335Updated 3 years ago
- A JBoss script for obtaining remote shell access☆170Updated 4 years ago
- Local File Inclusion Exploitation Tool (mirror)☆122Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆205Updated 6 years ago
- ☆84Updated 7 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆385Updated 3 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆270Updated 3 years ago