0x221b / Wordlists
A repository of wordlists for enumeration. Will be added to by my tools when they find interesting new entries
☆22Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Wordlists
- Enhanced 403 bypass header☆21Updated 2 years ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆36Updated last year
- IIS shortname scanner + bruteforce☆49Updated 9 months ago
- vīlicus is a bug bounty api dashboard☆40Updated last year
- ☆33Updated 3 years ago
- A solid recon tool I use personally.☆30Updated last year
- Some of the gf patterns which i use☆39Updated 2 years ago
- XSS Finder Via SSTI☆54Updated last year
- An MS Sharepoint and Frontpage Auditing Tool☆44Updated this week
- It grep subdomains, email/username, build custom wordlist etc from gau results☆45Updated 2 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆39Updated 5 months ago
- Script for Bug Bounty☆28Updated 3 years ago
- Supertruder but better☆33Updated last year
- Cool HackerOne Reports☆18Updated 2 years ago
- ☆43Updated 3 years ago
- Automated blind-xss search for Burp Suite☆24Updated 2 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Updated last year
- Authorization-Nuclei-Templates☆37Updated 2 months ago
- Web cache poisoning vulnerability scanner.☆61Updated 2 years ago
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆30Updated 4 years ago
- Modified Nuclei Templates Version to FUZZ Host Header☆48Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆31Updated 2 years ago
- Exploit scripts☆12Updated 2 years ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Updated 8 months ago
- This repository contains proof of concept for zero days and CVEs that were found by Omar Hashem through Security Research☆42Updated last year
- ☆28Updated 11 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆16Updated 3 years ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Updated 3 years ago