weev3 / LKWA
Lesser Known Web Attack Lab
☆330Updated 5 years ago
Alternatives and similar repositories for LKWA:
Users that are interested in LKWA are comparing it to the libraries listed below
- HTTP file upload scanner for Burp Proxy☆489Updated last year
- List DTDs and generate XXE payloads using those local DTDs.☆624Updated last year
- HTTP file upload scanner for Burp Proxy☆404Updated last year
- Another way to bypass WAF Cheat Sheet (draft)☆421Updated 6 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆720Updated 5 years ago
- Pentest/BugBounty progress control with scanning modules☆281Updated 4 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆711Updated last year
- Wordlists that have been compiled using Commonspeak2. This repo is updated every time new wordlists are generated.☆526Updated 6 years ago
- SSRF testing tool☆244Updated 2 years ago
- Repository for hosting my research papers☆506Updated last year
- ☆281Updated 3 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆267Updated 2 months ago
- this contain the burp pack☆205Updated 8 years ago
- Various Payload wordlists☆235Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆595Updated 4 years ago
- DNS rebinding toolkit☆252Updated last year
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆272Updated 4 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆274Updated 4 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆258Updated 2 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆348Updated 2 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆351Updated last month
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆412Updated 4 years ago
- Apache Solr Injection Research☆571Updated 5 years ago
- ☆265Updated 6 years ago
- A simple SSRF-testing sheriff written in Go☆326Updated 5 months ago
- Rock-On is a all in one Recon tool that will just get a single entry of the Domain name and do all of the work alone.☆297Updated 5 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆610Updated 2 months ago
- An hourly updated list of subdomains gathered from certificate transparency logs☆345Updated 3 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆546Updated 2 years ago