vulnersCom / detect-rulesLinks
Vulners signature-base software version detection rules
☆37Updated 3 years ago
Alternatives and similar repositories for detect-rules
Users that are interested in detect-rules are comparing it to the libraries listed below
Sorting:
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Burp scanner plugin based on Vulners.com vulnerability database☆25Updated 8 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- ☆86Updated 8 years ago
- DoS PoC's for SAP products☆52Updated 7 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Updated 4 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Updated 8 years ago
- XXE attack tool☆31Updated 9 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆23Updated 7 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆55Updated 9 years ago
- Duncan - Blind SQL injector skeleton☆58Updated 3 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Source Code Intelligence☆30Updated 8 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated last year
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Updated 5 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- ☆71Updated 7 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Updated 11 years ago