small script to detect web application firewall on any website
☆43Dec 13, 2016Updated 9 years ago
Alternatives and similar repositories for waf-detector
Users that are interested in waf-detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- sniff inputs type☆10Aug 3, 2017Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- The official PHP SDK for Shieldfy☆14May 21, 2019Updated 6 years ago
- Rinvex Composer is an intuitive package that utilizes Composer Plugin API to support additional actions during installation, such as inst…☆11Jul 22, 2024Updated last year
- Shortcut.css is the first css package it support your stylesheet, Contain custom & built-in variables and classes you can use it with an…☆10Nov 15, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- Logstash Configs and Kibana Dashboards for F5 LTM & ASM☆20Nov 8, 2017Updated 8 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Aug 25, 2016Updated 9 years ago
- ExtendedMacro - BurpSuite plugin providing extended macro functionality☆15Jan 13, 2021Updated 5 years ago
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Nov 11, 2022Updated 3 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Golang implementation of Dynamic DNS using CloudFlare☆16May 21, 2019Updated 6 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Nov 24, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Cortex Fort is a frontend layer for the powerful authentication, authorization and verification package rinvex/fort on top of Laravel. It…☆12Jul 22, 2024Updated last year
- Metasploit Framework☆26Feb 10, 2026Updated last month
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built in…☆131Oct 2, 2020Updated 5 years ago
- ☆90Aug 29, 2025Updated 6 months ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 3 years ago
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 10 months ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆93Jul 1, 2019Updated 6 years ago
- ☆16Mar 7, 2026Updated 2 weeks ago
- A program and toolset to analyze iDevice USB sessions☆33Feb 28, 2026Updated 3 weeks ago
- DNS File EXfiltration☆45Apr 12, 2024Updated last year
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Apr 11, 2017Updated 8 years ago
- Our fork of the esp-link firmware with a built in VNC server for passing input events to an AVR. Part of our Universal Serial aBUSe proje…☆11Dec 7, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Slides from "Betta hide yo downlinks (Building a budget friendly Az/El tracker)" presentation at Cyberspectrum #21☆14Aug 3, 2017Updated 8 years ago
- Automated testing of SMTP servers for penetration testing☆14Oct 23, 2025Updated 5 months ago
- A suite of cybersecurity applications used in Brazilian Army Cyber Security course to accelerate and automate processes. Some tools have …☆22Feb 23, 2025Updated last year
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago