tempto / wvatLinks
Web Vulnerability Assessment Tool
☆10Updated 3 years ago
Alternatives and similar repositories for wvat
Users that are interested in wvat are comparing it to the libraries listed below
Sorting:
- Challenges and official solutions for SINF CTF 2020 (companion CTF of SINF, for students, which I organized by myself)☆13Updated 4 years ago
- A simple app to demo SQL Injection login bypass☆25Updated 4 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 3 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆19Updated 2 years ago
- A ping detection tool for linux☆24Updated 5 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- PowerShell alternative/restriction bypass☆12Updated 2 months ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Creating attacks based on polyglot files. This tool (experimental) is useful in offensive security (stego malware, privilege escalation, …☆9Updated 5 years ago
- Website to check if facebook leaked your phone☆9Updated 4 years ago
- Notes and helper scripts/files/etc from when I passed my OSCP☆20Updated 5 years ago
- Software exploitation training material☆15Updated 8 years ago
- Mass malicious script dump/Malware src dump☆15Updated 8 years ago
- A quick reference script that can easily display reverse shells for different languages.☆21Updated 5 years ago
- Phoenix based exploit kit for educational purpose.☆17Updated 6 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Updated 4 years ago
- Industrial Hacking Simulator☆27Updated 3 weeks ago
- ☆18Updated last year
- Python script that automate the process of generating various reverse shells.☆15Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- Fully undetected backdoor with RSA Encrypted shell☆11Updated 7 years ago
- Development☆11Updated 4 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago