u0pattern / InsideVulnLinks
InsideVuln [Inside Vulnerabilities] : Python script to detect vulnerabilities into a PHP source code using statical analysis, based on regex .
☆8Updated 6 years ago
Alternatives and similar repositories for InsideVuln
Users that are interested in InsideVuln are comparing it to the libraries listed below
Sorting:
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated 2 years ago
- Analyze Android APK files from a browser.☆14Updated 4 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Updated 5 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 6 years ago
- PHP tool to test XSS☆22Updated 5 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Updated 7 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 5 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- A python library to automate time-based blind SQL injection☆50Updated 5 years ago
- ☆15Updated 2 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Burp Intruder File Payload Generator☆18Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 7 years ago
- ☆21Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Updated 9 years ago
- An Extended, Modulair, Host Discovery Framework☆43Updated 6 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Know the dangers of credential reuse attacks.☆7Updated 7 years ago
- Maintaining account persistence via XSS and Oauth☆77Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆85Updated 5 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Updated 2 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Updated last year
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- only for 31337☆23Updated 8 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago