Automated Python Code Injection Tool
☆87Oct 13, 2021Updated 4 years ago
Alternatives and similar repositories for PyCodeInjection
Users that are interested in PyCodeInjection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- subdomain、port、folder scanner☆25Apr 20, 2016Updated 9 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- A DNS tunnel utilizing the Burp Collaborator☆103Oct 8, 2019Updated 6 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- ☆36Jul 13, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A burp extender that recalculate signature value automatically after you modified request parameter value.☆60Nov 10, 2022Updated 3 years ago
- whatweb的插件☆15Aug 15, 2014Updated 11 years ago
- An open source XSS vulnerability scanner.☆61Nov 22, 2018Updated 7 years ago
- LFI scan, exploit tool☆13Nov 19, 2014Updated 11 years ago
- Exploiting CVE-2017-7525 demo project with Angular7 frontend and Spring.☆18Feb 21, 2019Updated 7 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆153May 4, 2017Updated 8 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- Trigger automated Acunetix scans as part of your web application's build process☆32Aug 9, 2024Updated last year
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- DNS Sub-domain brute forcer, in Python + gevent☆50Dec 9, 2016Updated 9 years ago
- Auto Updater Joomla Components and Exploits Scanner☆27Apr 1, 2018Updated 7 years ago
- writeup about XDCTF 2015☆62Oct 8, 2015Updated 10 years ago
- Spring messaging STOMP protocol RCE☆113Apr 12, 2018Updated 7 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- Code snippet accompanying blog post☆29Oct 14, 2015Updated 10 years ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- domain子域名穷举工具。☆20Jul 2, 2016Updated 9 years ago
- A set of XSS vulnerable PHP scripts for testing☆39Feb 10, 2013Updated 13 years ago
- The Security Practices of Party A Phishing☆20Nov 9, 2019Updated 6 years ago
- ☆78Oct 28, 2015Updated 10 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Aug 5, 2013Updated 12 years ago
- ☆74Aug 20, 2018Updated 7 years ago
- Simple XXE test suite generated specifically for SAML interfaces☆23May 18, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆206Mar 28, 2021Updated 4 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆801Nov 7, 2021Updated 4 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Multithreaded HTTP scanner☆46Jun 3, 2020Updated 5 years ago
- thorns_project 分布式异步队列系统☆148Feb 12, 2016Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- docker images☆13Oct 23, 2017Updated 8 years ago