swisskyrepo / Vulny-Code-Static-AnalysisView external linksLinks
Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex
☆418Feb 27, 2025Updated 11 months ago
Alternatives and similar repositories for Vulny-Code-Static-Analysis
Users that are interested in Vulny-Code-Static-Analysis are comparing it to the libraries listed below
Sorting:
- Another web vulnerabilities scanner, this extension works on Chrome and Opera☆467Sep 22, 2019Updated 6 years ago
- WPScan rewritten in Python + some WPSeku ideas☆650Jun 4, 2021Updated 4 years ago
- Automatic SSRF fuzzer and exploitation tool☆3,485Sep 4, 2025Updated 5 months ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,625Mar 11, 2024Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,484Oct 12, 2024Updated last year
- Retrieve LAPS password from LDAP☆433Feb 17, 2021Updated 4 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,901Sep 27, 2021Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 4 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆361Mar 6, 2025Updated 11 months ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆735May 4, 2019Updated 6 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- ☆17May 29, 2015Updated 10 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,182Dec 11, 2022Updated 3 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- ☆2,313Dec 8, 2023Updated 2 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- A tool that can scan php vulnerabilities automatically using static analysis methods☆488Mar 20, 2018Updated 7 years ago
- Various PowerShell scripts that may be useful during red team exercise☆960Apr 28, 2022Updated 3 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,239Jan 8, 2026Updated last month
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- offsec batteries included☆1,593Mar 11, 2024Updated last year
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆661Feb 1, 2025Updated last year
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆181Jul 26, 2017Updated 8 years ago
- Some tools to automate recon - 003random☆294Jun 5, 2018Updated 7 years ago
- A tool to abuse Exchange services☆2,297Jun 10, 2024Updated last year
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆153Dec 7, 2022Updated 3 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,770Apr 26, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,440Oct 1, 2025Updated 4 months ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆441Sep 19, 2021Updated 4 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,128Feb 10, 2021Updated 5 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,283Aug 18, 2025Updated 5 months ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆447Mar 31, 2024Updated last year
- List DTDs and generate XXE payloads using those local DTDs.☆645Feb 21, 2024Updated last year
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,033Jun 3, 2021Updated 4 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,704Dec 1, 2024Updated last year