0dayCTF / endletsLinks
Bookmarklet to find endpoints easily with one click
☆62Updated last year
Alternatives and similar repositories for endlets
Users that are interested in endlets are comparing it to the libraries listed below
Sorting:
- Autofill Phishing☆74Updated 7 months ago
- Analyze your tryhackme progress!☆12Updated last year
- capNcook - a dark web exploration tool☆73Updated last year
- CTF toolbox☆18Updated 4 years ago
- Remake of CVE-2020-9484 by Pentestical☆19Updated 10 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆51Updated 4 years ago
- Simple HTTP listener for security testing☆16Updated 2 years ago
- 🤖 The Modern Port Scanner 🤖☆19Updated 4 years ago
- Turning smart lights into Wifi Hacking implants.☆126Updated 5 months ago
- Scripts for offensive security☆144Updated 2 months ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆46Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- My personal pretesting recon/low hanging fruit script. Uses Gxss, Dalfox, and a few other scripts to scan all of a domain(and/or subdomai…☆21Updated 7 months ago
- notes and ramblings from my OSCP/PenTesting Studies☆92Updated last year
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆21Updated 5 years ago
- capNcook - a dark web exploration tool☆105Updated 10 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆112Updated last year
- Automate installation of extra pentest tools on Kali Linux☆55Updated 4 years ago
- A Powerful Intruder written in Python☆16Updated 3 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 4 months ago
- Koth - TryHackMe Tricks☆178Updated last year
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆194Updated 4 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆94Updated last year
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆47Updated last year
- Here are the most interesting Shodan dorks (according to me)☆83Updated last year
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆142Updated 9 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆64Updated last week
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆351Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
- Stuff about it-security that might be good to know☆22Updated 5 years ago