All Projects → Xxe Injection Payload List → Similar Projects or Alternatives

1805 Open source projects that are alternatives of or similar to Xxe Injection Payload List

Sql Injection Payload List
🎯 SQL Injection Payload List
Stars: ✭ 716 (+135.53%)
Mutual labels:  hacking, payload, websecurity, payloads, bugbounty
Rfi Lfi Payload List
🎯 RFI/LFI Payload List
Stars: ✭ 202 (-33.55%)
Xss Payload List
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
Stars: ✭ 2,617 (+760.86%)
Mutual labels:  payload, websecurity, payloads, bugbounty
Ssti Payloads
🎯 Server Side Template Injection Payloads
Stars: ✭ 150 (-50.66%)
Mutual labels:  payload, websecurity, payloads, bugbounty
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+10725.33%)
Mutual labels:  hacking, payload, payloads, bugbounty
netizenship
a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-89.14%)
Payloads
Git All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+841.45%)
Mutual labels:  hacking, cybersecurity, payload, payloads
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+67.43%)
Mutual labels:  hacking, infosec, bugbounty, bug-bounty
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+2283.55%)
Mutual labels:  hacking, infosec, bug-bounty, bugbounty
Cloudbrute
Awesome cloud enumerator
Stars: ✭ 268 (-11.84%)
Mutual labels:  hacking, infosec, bugbounty
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+1031.25%)
Mutual labels:  bug-bounty, infosec, bugbounty
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+52.3%)
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-40.13%)
Mutual labels:  hacking, infosec, bugbounty
Holisticinfosec For Webdevelopers Fascicle0
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
Stars: ✭ 37 (-87.83%)
Mutual labels:  hacking, infosec, websecurity
Hawkeye
Hawkeye filesystem analysis tool
Stars: ✭ 202 (-33.55%)
Mutual labels:  hacking, infosec, bug-bounty
Wireshark Cheatsheet
Wireshark Cheat Sheet
Stars: ✭ 131 (-56.91%)
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+541.12%)
Mutual labels:  infosec, cybersecurity, bugbounty
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (-5.26%)
CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+150%)
Mutual labels:  cybersecurity, bugbounty, payload
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-83.22%)
Open Redirect Payload List
🎯 Open Redirect Payload List
Stars: ✭ 214 (-29.61%)
Mutual labels:  payload, websecurity, payloads
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+7.89%)
Mutual labels:  hacking, bugbounty, bug-bounty
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+53.29%)
Mutual labels:  hacking, infosec, cybersecurity
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-79.61%)
Mutual labels:  hacking, infosec, bugbounty
Virtualseccons
An ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-62.83%)
Mutual labels:  hacking, infosec, cybersecurity
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-72.04%)
Mutual labels:  cybersecurity, infosec, bugbounty
Di.we.h
Repositório com conteúdo sobre web hacking em português
Stars: ✭ 156 (-48.68%)
Mutual labels:  hacking, bugbounty, bug-bounty
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-46.38%)
Mutual labels:  hacking, infosec, bugbounty
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-44.41%)
Mutual labels:  hacking, cybersecurity, bugbounty
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-60.2%)
Mutual labels:  hacking, cybersecurity, payload
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+804.61%)
Mutual labels:  hacking, cybersecurity, payloads
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-85.86%)
Mutual labels:  bug-bounty, infosec, bugbounty
Goaltdns
A permutation generation tool written in golang
Stars: ✭ 119 (-60.86%)
Mutual labels:  hacking, infosec, bug-bounty
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (-74.01%)
Mutual labels:  cybersecurity, infosec, bugbounty
Subjack
Subdomain Takeover tool written in Go
Stars: ✭ 1,194 (+292.76%)
Mutual labels:  infosec, bugbounty, bug-bounty
31 Days Of Api Security Tips
This challenge is Inon Shkedy's 31 days API Security Tips.
Stars: ✭ 1,038 (+241.45%)
Mutual labels:  infosec, bugbounty, bug-bounty
Awesome Hacking Lists
平常看到好的渗透hacking工具和多领域效率工具的集合
Stars: ✭ 311 (+2.3%)
Mutual labels:  hacking, bugbounty, bug-bounty
Bugbounty Cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
Stars: ✭ 3,644 (+1098.68%)
Mutual labels:  infosec, payloads, bugbounty
Payloads
Payload Arsenal for Pentration Tester and Bug Bounty Hunters
Stars: ✭ 421 (+38.49%)
Mutual labels:  bugbounty, payload, payloads
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+1269.08%)
Mutual labels:  hacking, infosec, information-security
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-53.29%)
Mutual labels:  bug-bounty, infosec, bugbounty
flydns
Related subdomains finder
Stars: ✭ 29 (-90.46%)
Mutual labels:  bug-bounty, infosec, bugbounty
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+252.96%)
Mutual labels:  hacking, infosec, bugbounty
lit-bb-hack-tools
Little Bug Bounty & Hacking Tools⚔️
Stars: ✭ 180 (-40.79%)
Mutual labels:  bug-bounty, infosec, bugbounty
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-37.5%)
Mutual labels:  hacking, bugbounty, bug-bounty
SuperLibrary
Information Security Library
Stars: ✭ 60 (-80.26%)
Mutual labels:  cybersecurity, infosec, bugbounty
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-10.53%)
Mutual labels:  hacking, infosec, cybersecurity
Subzy
Subdomain takeover vulnerability checker
Stars: ✭ 287 (-5.59%)
Mutual labels:  cybersecurity, bugbounty
Sub-Drill
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (-76.97%)
Mutual labels:  bug-bounty, bugbounty
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-72.37%)
Mutual labels:  cybersecurity, bugbounty
Astra
Astra is a tool to find URLs and secrets inside a webpage/files
Stars: ✭ 187 (-38.49%)
Mutual labels:  infosec, bugbounty
goverview
goverview - Get an overview of the list of URLs
Stars: ✭ 93 (-69.41%)
Mutual labels:  infosec, bugbounty
SQLi-Query-Tampering
SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
Stars: ✭ 123 (-59.54%)
Mutual labels:  bug-bounty, bugbounty
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+1015.46%)
Mutual labels:  hacking, bugbounty
XSS-Payload-without-Anything
XSS Payload without Anything.
Stars: ✭ 74 (-75.66%)
Mutual labels:  bugbounty, payloads
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-5.59%)
Mutual labels:  cybersecurity, infosec
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-85.2%)
Mutual labels:  cybersecurity, bugbounty
Loki.Rat
Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Remote Access Tool.
Stars: ✭ 63 (-79.28%)
Mutual labels:  payload, payloads
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+39.47%)
security-policy-specification-standard
This document proposes a way of standardising the structure, language, and grammar used in security policies.
Stars: ✭ 24 (-92.11%)
Mutual labels:  infosec, bugbounty
1-60 of 1805 similar projects