Home Search
vulnerable - search results
If you're not happy with the results, please do another search
Raptor WAF – Web application firewall using DFA
Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting and way traversal. It...
RouterSploit – Exploitation Framework For Embedded Devices
Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices.
The Routersploit contains various modules that perform penetration testing operations
exploits...
Hcxdumptool – Small Tool To Capture Packets From WLAN Devices
Hcxdumptool is small tool to capture packets from wlan devices. After capturing, upload the "uncleaned" cap here to see if your application or the...
Firebase – Tool To Exploiting Misconfigured Firebase Databases
Firebase exploiting tool is exploiting misconfigured firebase databases.
Disclaimer: The provided software is meant for educational purposes only. Use this at your own discretion, the...
XSS-Payload-List : Cross Site Scripting ( XSS ) Vulnerability Payload List
XSS-Payload-List or Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites....
CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities
CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing SPNs Accounts
RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue...
HABU – Network Penetration Testing Toolkit for Hackers and Pentesters
Habu is a python network hacking toolkit. This tool basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of...
CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities
CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
Havij Download – Advanced Automated SQL Injection Tool
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It's a completely...