weev3 / LKWALinks
Lesser Known Web Attack Lab
☆330Updated 5 years ago
Alternatives and similar repositories for LKWA
Users that are interested in LKWA are comparing it to the libraries listed below
Sorting:
- HTTP file upload scanner for Burp Proxy☆416Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆361Updated 10 months ago
- this contain the burp pack☆208Updated 9 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆405Updated this week
- Pentest/BugBounty progress control with scanning modules☆282Updated 5 years ago
- Rock-On is a all in one Recon tool that will just get a single entry of the Domain name and do all of the work alone.☆295Updated 6 years ago
- Another way to bypass WAF Cheat Sheet (draft)☆431Updated 7 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆737Updated 6 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆336Updated 4 years ago
- HTTP file upload scanner for Burp Proxy☆492Updated 2 years ago
- DNS rebinding toolkit☆255Updated 2 years ago
- Apache Solr Injection Research☆579Updated 6 years ago
- Contents for Node.Js Security Course☆343Updated 5 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆345Updated 3 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆294Updated last year
- SSRF testing tool☆246Updated 3 years ago
- A mini webserver with FTP support for XXE payloads☆342Updated 2 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆658Updated last year
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆261Updated 3 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆643Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Updated 4 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆265Updated 4 years ago
- Everything you need about Burp Extension Generation☆157Updated 3 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆273Updated 4 years ago
- An automated target reconnaissance pipeline.☆446Updated 2 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆279Updated last year
- simple script to extract all web resources by means of .SVN folder exposed over network.☆480Updated 2 years ago
- Scan Victim Backup Directories & Backup Files☆182Updated 2 years ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆416Updated 5 years ago