Burp Suite Extension to Discover Assets From HTTP Response xploitlab

BurpSuite Asset Discover – Burp Suite Extension to Discover Assets From HTTP Response

Burp Suite extension to discover assets from HTTP response using passive scanning. Passively parses HTTP response of the URLs in scope and identifies different type assets such as domain, subdomain, IP, S3 bucket etc.

Read more »
Vulnx - Tool To Detect Vulnerabilities in Multiple Types of CMS and Automatic Exploit

Vulnx – Tool To Detect Vulnerabilities in Multiple Types of CMS and Automatic Exploit

Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of CMS, informations gathering and vulnerabilitie Scanning.

Read more »
local and remote file inclution payload list

Local/Remote File Inclution (LFI/RFI) Payload List

I’ll give list of example code in PHP format to protecting your website and most importantly your code from a file inclusion (RFI/LFI) exploit.

Read more »
EyeWitness - Tool To Take Screenshots of Websites

EyeWitness – Tool To Take Screenshots of Websites, Provide Server Header Info

EyeWitness is designed to take screenshots of websites provide some server header info, and identify default credentials if known.

Read more »
Recon-ng - Full-featured Web Reconnaissance Framework

Recon-ng – Full-featured Web Reconnaissance Framework

Recon-ng is a full-featured Web Reconnaissance framework. Complete with web digging modules, database interaction, social media recon, report and more.

Read more »
CloudUnflare - Reconnaissance Real IP address for Cloudflare Bypass

CloudUnflare – Tool to Reconnaissance Real IP address for Cloudflare Bypass

CloudUnflare is a tool to Reconnaissance Real IP address for Cloudflare Bypass. Because Cloudflare will hide the Real IP address to protect from attack.

Read more »
sslsplit - Transparent SSL TLS interception

sslsplit – Transparent SSL/TLS interception

SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. It is intended to be useful for network forensics.

Read more »