wireghoul / dotdotpwnLinks
DotDotPwn - The Directory Traversal Fuzzer
☆1,052Updated 2 years ago
Alternatives and similar repositories for dotdotpwn
Users that are interested in dotdotpwn are comparing it to the libraries listed below
Sorting:
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,818Updated 3 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆549Updated 2 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,526Updated 2 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,234Updated last year
- Finds unknown classes of injection vulnerabilities☆684Updated last month
- Local file inclusion exploitation tool☆865Updated last year
- A Powerful Subdomain Takeover Tool☆951Updated last year
- This tool can be used to brute discover GET and POST parameters☆1,373Updated 5 years ago
- A default credential scanner.☆1,482Updated 3 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆536Updated 4 years ago
- Content discovery wordlists generated using BigQuery☆570Updated 5 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,214Updated 3 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,412Updated 4 months ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆549Updated 2 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,636Updated 6 months ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,083Updated 5 months ago
- ☆2,262Updated last year
- ☆813Updated last year
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,733Updated last year
- Subdomain Takeover tool written in Go☆1,973Updated last year
- My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.☆883Updated last month
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,525Updated last year
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,123Updated 8 months ago
- Vulnerability scanner based on vulners.com search API☆855Updated last year
- Automated & Manual Wordlists provided by Assetnote☆1,439Updated 10 months ago
- Exploitation for XSS☆717Updated 3 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,003Updated 3 years ago
- ☆997Updated this week
- This repository contains all the supplement material for the book "The art of sub-domain enumeration"☆647Updated 6 years ago
- Search for Directory Traversal Vulnerabilities☆442Updated 11 months ago