Bookmarklet to find endpoints easily with one click
☆79May 19, 2024Updated last year
Alternatives and similar repositories for endlets
Users that are interested in endlets are comparing it to the libraries listed below
Sorting:
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Quick commands for pentesting/No typing!☆17Nov 21, 2023Updated 2 years ago
- Simple HTTP listener for security testing☆20Oct 7, 2022Updated 3 years ago
- Autofill Phishing☆87Aug 25, 2025Updated 6 months ago
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- privilege escalation by piggy-backing user sudo requests☆11Feb 6, 2023Updated 3 years ago
- Automate installation of extra pentest tools on Kali Linux☆61Apr 18, 2021Updated 4 years ago
- 🤖 The Modern Port Scanner 🤖☆22Jul 1, 2021Updated 4 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated 2 years ago
- Xfinity / Comcast Wordlist Generator☆78Mar 24, 2023Updated 2 years ago
- A Powerful Intruder written in Python☆20Nov 18, 2021Updated 4 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Random OSINT idea tool thing☆24Jan 11, 2026Updated 2 months ago
- All the deals for InfoSec related software/tools this Black Friday☆16Nov 25, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆19May 29, 2023Updated 2 years ago
- Stuff about it-security that might be good to know☆24Oct 20, 2019Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆59Apr 18, 2021Updated 4 years ago
- qFlipper — desktop application for updating Flipper Zero firmware via PC☆16Mar 12, 2022Updated 4 years ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆17Oct 27, 2019Updated 6 years ago
- Tampermonkey Script - Amazon Giveaways☆15Dec 6, 2018Updated 7 years ago
- Spoof Calls For Free - Unlimited Usage☆132Nov 14, 2021Updated 4 years ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆17Aug 20, 2025Updated 7 months ago
- Simple HTTP listener for security testing☆119Nov 24, 2024Updated last year
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆416Aug 22, 2021Updated 4 years ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆62Sep 11, 2023Updated 2 years ago
- This is a framework used to weaponize any USB Drive☆46Sep 29, 2022Updated 3 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆121Jan 23, 2024Updated 2 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- CTF toolbox☆21Feb 14, 2021Updated 5 years ago
- ☆10Oct 18, 2024Updated last year
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆15Mar 30, 2025Updated 11 months ago
- Apple BLE proximity pairing message spoofing☆23Sep 21, 2023Updated 2 years ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆518Jun 22, 2022Updated 3 years ago
- Learn Network Hacking From Scratch (WiFi and Wired), published by Packt☆13Oct 28, 2022Updated 3 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- My notes containing the Certified Red Team Professional Course☆71Sep 7, 2024Updated last year
- ☆18May 6, 2023Updated 2 years ago