Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex
☆422Feb 27, 2025Updated last year
Alternatives and similar repositories for Vulny-Code-Static-Analysis
Users that are interested in Vulny-Code-Static-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Another web vulnerabilities scanner, this extension works on Chrome and Opera☆471Sep 22, 2019Updated 6 years ago
- WPScan rewritten in Python + some WPSeku ideas☆654Jun 4, 2021Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Dec 23, 2020Updated 5 years ago
- Simple script for the WHID injector - a rubberducky wifi☆119Jul 16, 2024Updated last year
- Automatic SSRF fuzzer and exploitation tool☆3,539Sep 4, 2025Updated 8 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Upgrading jsleak with a CI/CD and new rules☆17May 6, 2023Updated 3 years ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,656Mar 11, 2024Updated 2 years ago
- Retrieve LAPS password from LDAP☆442Feb 17, 2021Updated 5 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,493Oct 12, 2024Updated last year
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,934Sep 27, 2021Updated 4 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆364Mar 6, 2025Updated last year
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆740May 4, 2019Updated 7 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆615Mar 4, 2021Updated 5 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,192Dec 11, 2022Updated 3 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆154Dec 7, 2022Updated 3 years ago
- A tool that can scan php vulnerabilities automatically using static analysis methods☆489Mar 20, 2018Updated 8 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,274Jan 8, 2026Updated 4 months ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- Some tools to automate recon - 003random☆295Jun 5, 2018Updated 7 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆660Feb 1, 2025Updated last year
- Quick SQLMap Tamper Suggester☆1,402Jul 18, 2022Updated 3 years ago
- Windows passwords decryption from dump files☆514Feb 2, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,044Jun 3, 2021Updated 4 years ago
- Burp Suite extension to discover assets from HTTP response.☆232Jan 22, 2025Updated last year
- HTTP parameter discovery suite.☆6,216Feb 20, 2025Updated last year
- ☆2,324Dec 8, 2023Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆702Aug 2, 2018Updated 7 years ago
- A tool to abuse Exchange services☆2,303Jun 10, 2024Updated last year
- offsec batteries included☆1,613Mar 11, 2024Updated 2 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,800Apr 26, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆442Sep 19, 2021Updated 4 years ago
- ☆17May 29, 2015Updated 10 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,292Aug 18, 2025Updated 8 months ago
- XSS Hunter Burp Plugin☆151Aug 31, 2018Updated 7 years ago
- Various PowerShell scripts that may be useful during red team exercise☆965Apr 28, 2022Updated 4 years ago
- JShell - Get a JavaScript shell with XSS.☆534May 5, 2019Updated 7 years ago