Stars
417
Forks
60
Language
Java
Last Updated
May 28, 2024
Similar Repos
Repo | Language | Stars | Description | Updated At |
---|---|---|---|---|
Python | 7 | wifi bruteforce Script with wordlist and without wordlist | Oct 16, 2022 | |
Java | 104 | RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote … | May 27, 2023 | |
Python | 13 | Python ZIP Cracker with Bruteforce method and create file wordlist or with wordlist file | Aug 04, 2022 | |
None | 3 | Wordlist for content(directory) bruteforce discovering with Burp and dirsearch | Sep 08, 2021 | |
Python | 6 | Wordpress Hunting Vulnerabilities and Bruteforce tool using Google Dork | May 02, 2023 | |
C# | 1393 | Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities | May 11, 2023 | |
Python | 21 | Smuggler can detect and exploit -HTTP Smuggling- vulnerabilities. | Mar 27, 2023 | |
JavaScript | 2 | PoC Code and Exploit Payloads for Popcorn Time Vulnerabilities | Jul 21, 2017 | |
Python | 26 | Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments | Dec 23, 2021 | |
C | 2 | Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle. | May 19, 2020 | |
C | 562 | Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle. | May 05, 2023 | |
None | 49 | Vulnerabilities in Web Application and How to test and exploit for them. | Aug 09, 2022 | |
PHP | 40 | small set of scripts to practice exploit XSS and CSRF vulnerabilities | Jul 20, 2022 | |
None | 3 | A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo | Oct 28, 2020 | |
None | 2 | A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo | May 15, 2020 | |
Shell | 3 | It is a metasploit exploit tool to exploit vulnerabilities in servers and devices It also … | Apr 22, 2022 | |
PowerShell | 7 | Functions for setting and saving PowerShell default parameter values | Aug 15, 2021 | |
Python | 19 | Research into potential vulnerabilities and risks of auto-generated pseudorandom passwords + Bluetooth Exploit. | Jan 23, 2022 | |
None | 145 | A step by step workshop to exploit various vulnerabilities in Node.js and Java applications | Jun 13, 2022 | |
Python | 2 | A FastAPI middleware to help protect against spammers and bots trying to exploit vulnerabilities | Oct 18, 2022 | |
PHP | 2 | Demo web application vulnerable to some simple and some difficult to exploit SQL injection vulnerabilities | Sep 02, 2022 | |
Perl | 18 | Function::Parameters - define functions and methods with parameter lists ("subroutine signatures") | Mar 26, 2023 | |
None | 4 | A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux … | Jun 28, 2022 | |
C | 1594 | A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux … | Aug 19, 2022 | |
Python | 593 | BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive … | Sep 18, 2022 | |
None | 2 | BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive … | Nov 08, 2021 | |
Shell | 31 | BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive … | Jul 04, 2022 | |
Shell | 11 | BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive … | Jan 14, 2023 | |
Go | 20 | Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug … | Apr 30, 2023 | |
None | 10 | List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in … | May 03, 2023 | |
Vue | 9 | An Identity Manager that uses Handshake Login and works with all supported strategies. | Jun 07, 2022 | |
Python | 17 | This project is designed to enumerate back-end hosting Content Management Systems and aid security professionals … | Feb 13, 2023 | |
HTML | 5 | A malicious JavaScript script that exploit XSS vulnerabilities in a modern way using steganography technique … | May 30, 2022 | |
C | 3 | A smart vulnerability detector that uses graph analysis techniques to identify and target vulnerabilities | Feb 06, 2016 | |
Python | 4 | Cross Site "Scripter" is an automatic -framework- to detect, exploit and report XSS vulnerabilities in … | Aug 08, 2022 | |
Kotlin | 71 | A JAX-RS message body reader/writer and parameter converter which uses Kotlinx Serialization | May 24, 2022 | |
None | 2 | Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by … | Nov 23, 2021 | |
None | 2 | A tool created for a massive search of minecraft servers, search for vulnerabilities and tools … | Apr 24, 2024 | |
R | 3 | R frontend for the Python rosetta-soil module. Uses {reticulate} to wrap the Rosetta pedotransfer functions … | Apr 14, 2023 | |
Python | 908 | Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS … | Apr 27, 2023 | |
Java | 90 | A JAX-RS message body reader/writer and parameter converter which uses Moshi to handle JSON | Jun 17, 2022 | |
None | 2 | Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within … | May 01, 2022 | |
Go | 830 | MassDNS wrapper written in go that allows you to enumerate valid subdomains using active bruteforce … | Aug 11, 2022 | |
Shell | 51 | Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to … | Aug 18, 2022 | |
JavaScript | 5 | 🐞 Understand how cross-site scripting occurs, how to detect and exploit XSS vulnerabilities, giving you … | Oct 12, 2022 | |
None | 3 | Learn how to find and exploit IDOR vulnerabilities in a web application giving you access … | Dec 30, 2023 | |
JavaScript | 6 | A GitHub Action that uses OpenAI's GPT to identify security and privacy vulnerabilities and comment … | Apr 17, 2023 | |
C | 2 | Benchmark Functions for the Special Session and Competition on Real-Parameter Single Objective Optimization at CEC-2013 | Dec 22, 2020 | |
Java | 94 | 40+ Gadgets(More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide … | Aug 22, 2022 | |
CSS | 219 | A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to … | Apr 17, 2023 |