shieldfy / waf-detector
small script to detect web application firewall on any website
☆42Updated 8 years ago
Alternatives and similar repositories for waf-detector:
Users that are interested in waf-detector are comparing it to the libraries listed below
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- ☆38Updated 7 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Updated 7 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- A security scanner for Wordpress blogging engine☆32Updated 8 years ago
- Express security essentials deployment for Linux Servers☆59Updated 4 years ago
- Puny Domain Name Check☆37Updated 5 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Updated 7 months ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 8 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Scans crossdomain.xml policies for expired domain names.☆25Updated 9 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 10 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- A script that inspects multi-byte character sets looking for characters with specific user-defined properties☆26Updated 8 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- ☆13Updated 7 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A very simple Python script to take screenshots of websites☆18Updated 7 years ago
- Metasploit Framework☆26Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Exploits and research stuffs☆54Updated last year
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 3 years ago
- ☆23Updated 7 years ago