Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or joomla platform was used and finally check them automatically, for web vulnerabilities using two well‐known open source tools, WPScan and Joomscan.
☆84Mar 8, 2018Updated 7 years ago
Alternatives and similar repositories for Jaidam
Users that are interested in Jaidam are comparing it to the libraries listed below
Sorting:
- ZTE ZXV10 H108L Router with <= V1.0.01_WIND_A01 - Remote root RCE Exploit☆52Sep 21, 2016Updated 9 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Atmel MARC4 disassembler☆16Mar 29, 2013Updated 12 years ago
- A collection of web pages, vulnerable to command injection flaws☆181Mar 5, 2023Updated 3 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- A python script for obfuscating wireless networks☆79Nov 14, 2016Updated 9 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- SpeedPhishing Framework☆449Aug 8, 2019Updated 6 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Feb 2, 2021Updated 5 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- Modules created by Nettitude for Metasploit☆12Jun 20, 2018Updated 7 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- Python OSINT Tool to retrieve information from Skype☆76Oct 12, 2015Updated 10 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Web Exploitation Framework - Beta Release☆24Mar 20, 2015Updated 10 years ago
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago