wireghoul / dotdotpwn
DotDotPwn - The Directory Traversal Fuzzer
☆973Updated last year
Related projects: ⓘ
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,661Updated 2 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,188Updated 9 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,299Updated 4 months ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆512Updated 2 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,472Updated last year
- Local file inclusion exploitation tool☆767Updated last year
- Setup script for Regon-ng☆915Updated 3 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆523Updated 2 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,657Updated 4 months ago
- A Powerful Subdomain Takeover Tool☆919Updated 11 months ago
- A default credential scanner.☆1,429Updated 2 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,089Updated 4 months ago
- Finds unknown classes of injection vulnerabilities☆626Updated 11 months ago
- pwning IPv4 via IPv6☆1,675Updated 6 months ago
- dnsenum is a perl script that enumerates DNS information☆592Updated 4 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆955Updated 6 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,030Updated 2 months ago
- Automated script for performing Padding Oracle attacks☆744Updated 2 months ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,101Updated last year
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,479Updated last year
- Discover Your Attack Surface!☆1,350Updated last year
- My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.☆778Updated last week
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆553Updated 4 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆1,992Updated this week
- Exploitation for XSS☆700Updated 3 years ago
- offsec batteries included☆1,492Updated 6 months ago
- ☆950Updated 9 months ago
- Subdomain Takeover tool written in Go☆1,892Updated last year
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆924Updated this week
- Notes about attacking Jenkins servers☆1,949Updated 2 months ago