pocsploit: open source PoC verification framework
pocsploit pocsploit is a lightweight, flexible, and novel open-source poc verification framework. Pain points of the POC framework in the market There are too many parameters, I don’t know how...
pocsploit pocsploit is a lightweight, flexible, and novel open-source poc verification framework. Pain points of the POC framework in the market There are too many parameters, I don’t know how...
Local PHP Security Checker The Local PHP Security Checker is a command-line tool that checks if your PHP application depends on PHP packages with known security vulnerabilities. It uses the...
Node Security Shield Node Security Shield (NSS) is a Developer and Security Engineer friendly module for Securing NodeJS Applications by allowing developers to declare what resources an application can access....
DOME – A subdomain enumeration tool Dome is a fast and reliable python script that makes active and/or passive scans to obtain subdomains and search for open ports. This tool...
Reconator Reconator is a Framework for automating your process of reconnaissance without any Computing resource (Systemless Recon) free of cost. Its Purely designed to host on Heroku which is a...
wpgarlic A proof-of-concept WordPress plugin fuzzer used in the research described in https://kazet.cc/2022/02/03/fuzzing-wordpress-plugins.html that helped to discover more than 120 vulnerabilities in WordPress plugins installed on more than 10 million sites....
RevSuit – A Flexible and Powerful Reverse Connection Platform RevSuit is a flexible and powerful reverse connection platform designed for receiving connections from the target hosts in penetration. It currently...
ShadowClone ShadowClone is designed to delegate time-consuming tasks to the cloud by distributing the input data to multiple serverless functions (AWS Lambda, Azure Functions, etc.) and running the tasks in...
spring4shell scan A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities. The Spring4Shell RCE is a critical vulnerability that FullHunt has been researching since...
HTTP CL.TE & TE.CL Desync Calculator Perform CL.TE and TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically. A simple python script that allows you to customise both Normal...
C0deVari4nt C0deVari4nt is a variant analysis and visualisation tool that inspects codebases for similar vulnerabilities. It leverages CodeQL, a semantic code analysis engine, to query code based on user-controlled CodeQL...
Agartha { LFI | RCE | Auth | SQLi | Http-Js } Agartha is a penetration testing tool that creates dynamic payload lists and user access matrix to reveal injection...
Nuclei plugin for BurpSuite A BurpSuite plugin intended to help with nuclei template generation. Features Template matcher generation Word and Binary matcher creation using selected response snippets from Proxy history or Repeater contexts Multi-line selections are split to separate...
Nuclei – Burp Extension A simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues. Installation Load the extension to burp Download...
Request smuggler – Http request smuggling vulnerability scanner Based on the amazing research by James Kettle. The tool can help to find servers that may be vulnerable to request smuggling vulnerability. Installation Linux...