wireghoul / dotdotpwn
DotDotPwn - The Directory Traversal Fuzzer
☆1,016Updated 2 years ago
Alternatives and similar repositories for dotdotpwn:
Users that are interested in dotdotpwn are comparing it to the libraries listed below
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,756Updated 2 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,215Updated last year
- The XSS Hunter service - a portable version of XSSHunter.com☆1,512Updated 2 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆531Updated 2 years ago
- A default credential scanner.☆1,466Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,379Updated last month
- This tool can be used to brute discover GET and POST parameters☆1,361Updated 5 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆969Updated 7 years ago
- Local file inclusion exploitation tool☆834Updated last year
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆545Updated 2 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,084Updated this week
- Finds unknown classes of injection vulnerabilities☆651Updated last year
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,592Updated 2 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,708Updated 9 months ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,067Updated 2 months ago
- Setup script for Regon-ng☆923Updated 4 years ago
- ⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.☆774Updated last year
- kadimus is a tool to check and exploit lfi vulnerability.☆526Updated 4 years ago
- A Powerful Subdomain Takeover Tool☆939Updated last year
- Content discovery wordlists generated using BigQuery☆563Updated 4 years ago
- Exploitation for XSS☆711Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,141Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆559Updated 9 months ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,178Updated 2 weeks ago
- Vulnerability scanner based on vulners.com search API☆847Updated 10 months ago
- ☆2,237Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,385Updated 4 months ago
- Automated script for performing Padding Oracle attacks☆765Updated 7 months ago
- 🎯 RFI/LFI Payload List☆557Updated 7 months ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,489Updated last year