003random / lokiLinks
☆51Updated 2 years ago
Alternatives and similar repositories for loki
Users that are interested in loki are comparing it to the libraries listed below
Sorting:
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆92Updated 2 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆125Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆107Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆53Updated 3 years ago
- Attack Surface Discovery Tool☆110Updated last year
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆98Updated 3 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated 6 months ago
- ☆57Updated 3 years ago
- ☆66Updated 2 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- ☆77Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 10 months ago
- ☆38Updated 4 years ago
- ☆43Updated 7 months ago
- ☆29Updated 4 years ago
- ☆57Updated last year
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 10 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆80Updated 3 years ago
- Information Security Information From Web☆28Updated 4 months ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated 11 months ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago