Pemburu AKA GoldDigger.
☆71Feb 20, 2020Updated 6 years ago
Alternatives and similar repositories for Pemburu
Users that are interested in Pemburu are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a POC for the Fortigate OS Backdoor found in version 4.x up to 5.0.7☆28Jan 13, 2016Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- POC MS15-034☆33Apr 28, 2015Updated 10 years ago
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Oct 7, 2015Updated 10 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- Proof of concept code for client-side vulnerabilities☆17Mar 14, 2019Updated 7 years ago
- Clickjacking Proof-of-Concept Exploit☆26Oct 1, 2020Updated 5 years ago
- a collection of payloads for common webapps☆72Apr 24, 2013Updated 12 years ago
- Git Repo and Filesystem credential scanner☆18Sep 8, 2017Updated 8 years ago
- Example FaaS stack for Raspberry Pi (ARM) to integrate with Github events.☆10Mar 31, 2017Updated 9 years ago
- ☆231Nov 18, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- ☆11Apr 2, 2022Updated 4 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Mar 14, 2017Updated 9 years ago
- A website outlining my bounty hunt game.☆11Oct 13, 2019Updated 6 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- a tiny tool for swf hacking, just browse it:)☆243Mar 13, 2013Updated 13 years ago
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- 3.8.x - 4.2.3 ForumRunner (vBulletin) exploit Proof of Concept☆38Jul 31, 2017Updated 8 years ago
- ☆25Feb 11, 2024Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- WebPwn3r - Web Applications Security Scanner.☆460Dec 9, 2021Updated 4 years ago
- A tool for enumerating expired domains in CNAME records☆60Jun 30, 2016Updated 9 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆25Mar 20, 2026Updated 3 weeks ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pentest-Command☆20Nov 10, 2021Updated 4 years ago
- SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.☆481Jan 1, 2018Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- ☆15Apr 12, 2018Updated 7 years ago
- ☆478Jan 29, 2021Updated 5 years ago
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- A repository of public reports, publications, and presentations associated with research performed by Security Engineers at Security In…☆52Jul 2, 2019Updated 6 years ago