SSRFmap - Automatic SSRF Fuzzer and Exploitation Tool

SSRFmap – Automatic SSRF Fuzzer and Exploitation Tool

SSRFMap is an open-sources SSRF tool. It aims to automate the detection and exploitation of SSRF vulnerabilities. SSRFmap takes a Burp request file as input and a parameter to fuzz.

Read more »
XSStrike - Automated XSS tool for detection and exploit

XSStrike – Most Advanced XSS Scanner Tool

XSS tool that can help you identify and mitigate XSS vulnerabilities is XSStrike. XSS or Cross-Site Scripting is a common web application vulnerability that allows an attacker to inject malicious…

Read more »

CRLFuzz – Tool to Automatically Scan CRLF Vulnerability

CRLFuzz is a powerful tool used for detecting and exploiting vulnerabilities that arise from the presence of Carriage Return (CR) and Line Feed (LF) characters in web applications. These vulnerabilities…

Read more »
FirebaseExploiter - Automate Tool to Scan Vulnerable Firebase and exploit it

FirebaseExploiter – Tool to Discovers Exploitable Firebase

Firebase is a popular mobile and web application development platform that provides developers with a range of features such as real-time database, authentication, and hosting services. FirebaseExploiter takes advantage of…

Read more »
Ghauri - Advance Tool to Automatically Detect and Exploiting SQL Injection xploitlab

Ghauri – Advance Tool to Automatically Detect and Exploiting SQL Injection

Ghauri An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws. Requirements Features Installation Download Ghauri

Read more »
Fully automated Log4j RCE Scanning and Exploit Tool Kali Linux

log4j-scan – Log4j RCE Scanning and Exploit Tool

Log4j RCE or CVE-2021-44228 is a critical common vulnerability, this allow attacker to do remote code execution on target website. Scanning and Exploiting Log4j can be done manually and also…

Read more »
Subzy - Subdomain Takeover Vulnerability Scan Tool

Subzy – Subdomain Takeover Vulnerability Tool

Subdomain Takeover Vulnerability Subdomain takeover is a high security vulnerability that infect many websites. Subdomain takeover caused by unclaimed CNAME record in third party web applications. Many companies use third…

Read more »