Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex
☆422Feb 27, 2025Updated last year
Alternatives and similar repositories for Vulny-Code-Static-Analysis
Users that are interested in Vulny-Code-Static-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Another web vulnerabilities scanner, this extension works on Chrome and Opera☆471Sep 22, 2019Updated 6 years ago
- WPScan rewritten in Python + some WPSeku ideas☆654Jun 4, 2021Updated 4 years ago
- Automatic SSRF fuzzer and exploitation tool☆3,528Sep 4, 2025Updated 7 months ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,651Mar 11, 2024Updated 2 years ago
- Retrieve LAPS password from LDAP☆441Feb 17, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SSRF (Server Side Request Forgery) testing resources☆2,485Oct 12, 2024Updated last year
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,918Sep 27, 2021Updated 4 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆364Mar 6, 2025Updated last year
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆740May 4, 2019Updated 6 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,189Dec 11, 2022Updated 3 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆154Dec 7, 2022Updated 3 years ago
- A tool that can scan php vulnerabilities automatically using static analysis methods☆489Mar 20, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,260Jan 8, 2026Updated 3 months ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- Some tools to automate recon - 003random☆294Jun 5, 2018Updated 7 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆660Feb 1, 2025Updated last year
- Quick SQLMap Tamper Suggester☆1,399Jul 18, 2022Updated 3 years ago
- Windows passwords decryption from dump files☆514Feb 2, 2023Updated 3 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,041Jun 3, 2021Updated 4 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- Burp Suite extension to discover assets from HTTP response.☆233Jan 22, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- HTTP parameter discovery suite.☆6,190Feb 20, 2025Updated last year
- ☆2,322Dec 8, 2023Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆702Aug 2, 2018Updated 7 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- offsec batteries included☆1,609Mar 11, 2024Updated 2 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,795Apr 26, 2024Updated last year
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆441Sep 19, 2021Updated 4 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,289Aug 18, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- XSS Hunter Burp Plugin☆151Aug 31, 2018Updated 7 years ago
- Various PowerShell scripts that may be useful during red team exercise☆964Apr 28, 2022Updated 3 years ago
- JShell - Get a JavaScript shell with XSS.☆534May 5, 2019Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,854Apr 8, 2026Updated last week
- A Burp Extension designed to identify argument injection vulnerabilities.☆123Apr 16, 2019Updated 7 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago