xxexploiter Logo

xxexploiter

0
Free
Visit Website

Tool to help exploit XXE vulnerabilities This tool helps to exploit XXE vulnerabilities by sending a crafted XML file to the server and then parsing it to extract the data. Features: * Sends a crafted XML file to the server * Parses the XML file to extract the data Note: This tool is for educational purposes only and should not be used to exploit vulnerabilities in a malicious manner.

FEATURES

ALTERNATIVES

A tool that generates pseudo-malicious files to trigger YARA rules.

A tool for finding and exploiting SQL injection vulnerabilities in web applications

Online Java decompiler tool with support for modern Java features.

A Django web interface for managing Yara rules with features like search, categorization, and bulk edits.

A portable version of XSSHunter.com for finding and exploiting Cross-Site Scripting (XSS) vulnerabilities.

YARA extension for Visual Studio Code with code completion and snippets

Parse YARA rules into a dictionary representation.

Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.

PINNED

InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Commercial
Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Free
Resources
Kriptos Logo

Kriptos

An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

Commercial
Data Protection
System Two Security Logo

System Two Security

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Commercial
Security Operations
Aikido Security Logo

Aikido Security

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Commercial
Application Security
Permiso Logo

Permiso

Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Commercial
IAM
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Commercial
Cloud Security
Adversa AI Logo

Adversa AI

Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.

Commercial
AI Security