wireghoul / dotdotpwn
DotDotPwn - The Directory Traversal Fuzzer
☆1,004Updated 2 years ago
Alternatives and similar repositories for dotdotpwn:
Users that are interested in dotdotpwn are comparing it to the libraries listed below
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,730Updated 2 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆525Updated 2 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,211Updated last year
- This tool can be used to brute discover GET and POST parameters☆1,356Updated 5 years ago
- Local file inclusion exploitation tool☆813Updated last year
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆539Updated 2 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆521Updated 4 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,577Updated last month
- Finds unknown classes of injection vulnerabilities☆643Updated last year
- A default credential scanner.☆1,459Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,358Updated last week
- Setup script for Regon-ng☆920Updated 4 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆962Updated 7 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,053Updated last month
- A Powerful Subdomain Takeover Tool☆939Updated last year
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,694Updated 8 months ago
- This repository contains all the supplement material for the book "The art of sub-domain enumeration"☆638Updated 5 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,158Updated 2 months ago
- Automated script for performing Padding Oracle attacks☆757Updated 6 months ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,506Updated 2 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,069Updated this week
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆987Updated 3 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,482Updated last year
- Content discovery wordlists generated using BigQuery☆562Updated 4 years ago
- Herramienta para evadir disable_functions y open_basedir☆401Updated last year
- ☆966Updated last week
- SSRF (Server Side Request Forgery) testing resources☆2,375Updated 3 months ago
- Search for Directory Traversal Vulnerabilities☆421Updated 6 months ago
- Quick SQLMap Tamper Suggester☆1,356Updated 2 years ago
- ☆795Updated last year