0dayCTF / endlets
Bookmarklet to find endpoints easily with one click
☆39Updated 4 months ago
Related projects: ⓘ
- Autofill Phishing☆42Updated 2 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆34Updated 3 years ago
- capNcook - a dark web exploration tool☆51Updated 5 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆227Updated 2 weeks ago
- ☆67Updated last year
- notes and ramblings from my OSCP/PenTesting Studies☆66Updated 10 months ago
- capNcook - a dark web exploration tool☆66Updated 8 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆76Updated 7 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆118Updated 2 weeks ago
- My personal pretesting recon/low hanging fruit script. Uses Gxss, Dalfox, and a few other scripts to scan all of a domain(and/or subdomai…☆18Updated last month
- Here are the most interesting Shodan dorks (according to me)☆63Updated 9 months ago
- Automation tool to testing and confirm the xss vulnerability.☆104Updated this week
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆204Updated 8 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆165Updated 7 months ago
- Automate installation of extra pentest tools on Kali Linux☆40Updated 3 years ago
- ☆101Updated this week
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆37Updated last year
- An auto-updating list of shodan dorks with info on the amount of results they return!☆144Updated 2 months ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆139Updated 4 months ago
- ☆27Updated 2 months ago
- ☆110Updated 7 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆250Updated 3 months ago
- custom-echo for koth tryhackme, holmes is such a homie <3☆15Updated 2 years ago
- XSS Rocket is written by Black Hat Ethical Hacking with the help of #ChatGPT as experimentation, with a lot of hours spent modifying the …☆92Updated 2 weeks ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆295Updated 3 weeks ago
- Shodan Dorks☆176Updated 3 weeks ago
- Scripts for offensive security☆59Updated 3 weeks ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆279Updated 8 months ago
- Automated exploit scanner for cameras on the internet☆166Updated 6 months ago