0dayCTF / endletsLinks
Bookmarklet to find endpoints easily with one click
☆67Updated last year
Alternatives and similar repositories for endlets
Users that are interested in endlets are comparing it to the libraries listed below
Sorting:
- Autofill Phishing☆76Updated last month
- Remake of CVE-2020-9484 by Pentestical☆20Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆52Updated 4 years ago
- Analyze your tryhackme progress!☆12Updated last year
- 🤖 The Modern Port Scanner 🤖☆19Updated 4 years ago
- CTF toolbox☆19Updated 4 years ago
- capNcook - a dark web exploration tool☆76Updated last year
- Simple HTTP listener for security testing☆17Updated 3 years ago
- My personal pretesting recon/low hanging fruit script. Uses Gxss, Dalfox, and a few other scripts to scan all of a domain(and/or subdomai…☆20Updated 3 weeks ago
- Scripts for offensive security☆161Updated 4 months ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆46Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 6 months ago
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆49Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆373Updated last year
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆158Updated 10 months ago
- Koth - TryHackMe Tricks☆184Updated last year
- A Powerful Intruder written in Python☆17Updated 3 years ago
- Turning smart lights into Wifi Hacking implants.☆129Updated 8 months ago
- Automate installation of extra pentest tools on Kali Linux☆55Updated 4 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆127Updated last year
- Automation tool to testing and confirm the xss vulnerability.☆292Updated 2 months ago
- A blind SQL injection brute forcer☆111Updated 5 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆354Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆98Updated 2 years ago
- Here are the most interesting Shodan dorks (according to me)☆93Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆109Updated 2 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆20Updated 5 years ago
- A python script that look for hikvision vulnerable cams with a backdoor☆24Updated last year
- tryhame rooms walkthrough☆35Updated 2 weeks ago