Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex
☆419Feb 27, 2025Updated last year
Alternatives and similar repositories for Vulny-Code-Static-Analysis
Users that are interested in Vulny-Code-Static-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Another web vulnerabilities scanner, this extension works on Chrome and Opera☆472Sep 22, 2019Updated 6 years ago
- WPScan rewritten in Python + some WPSeku ideas☆652Jun 4, 2021Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Dec 23, 2020Updated 5 years ago
- Simple script for the WHID injector - a rubberducky wifi☆119Jul 16, 2024Updated last year
- Automatic SSRF fuzzer and exploitation tool☆3,515Sep 4, 2025Updated 6 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Upgrading jsleak with a CI/CD and new rules☆17May 6, 2023Updated 2 years ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,644Mar 11, 2024Updated 2 years ago
- Retrieve LAPS password from LDAP☆440Feb 17, 2021Updated 5 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,482Oct 12, 2024Updated last year
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,910Sep 27, 2021Updated 4 years ago
- Hardware/IOT Pentesting Wiki☆849Nov 9, 2025Updated 4 months ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆363Mar 6, 2025Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆738May 4, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,189Dec 11, 2022Updated 3 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆154Dec 7, 2022Updated 3 years ago
- A tool that can scan php vulnerabilities automatically using static analysis methods☆488Mar 20, 2018Updated 8 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,251Jan 8, 2026Updated 2 months ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- Some tools to automate recon - 003random☆294Jun 5, 2018Updated 7 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- Windows passwords decryption from dump files☆514Feb 2, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Quick SQLMap Tamper Suggester☆1,398Jul 18, 2022Updated 3 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,040Jun 3, 2021Updated 4 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- Burp Suite extension to discover assets from HTTP response.☆233Jan 22, 2025Updated last year
- HTTP parameter discovery suite.☆6,154Feb 20, 2025Updated last year
- ☆2,321Dec 8, 2023Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆701Aug 2, 2018Updated 7 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- offsec batteries included☆1,607Mar 11, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,790Apr 26, 2024Updated last year
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆442Sep 19, 2021Updated 4 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,286Aug 18, 2025Updated 7 months ago
- ☆17May 29, 2015Updated 10 years ago
- XSS Hunter Burp Plugin☆151Aug 31, 2018Updated 7 years ago
- Various PowerShell scripts that may be useful during red team exercise☆962Apr 28, 2022Updated 3 years ago