☆25Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for WebHacking-Compiled
Users that are interested in WebHacking-Compiled are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Mar 21, 2026Updated last month
- I provide educational resources in this repository for starting bug hunting from scratch. The content will be updated over time! Also, I …☆32Jul 13, 2023Updated 2 years ago
- Url scrapper or extractor from alienvault☆39Mar 1, 2025Updated last year
- This Tool To Test Machine Keys In View State☆86Oct 11, 2024Updated last year
- Tools for bug bounty☆29Jul 9, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repository contains links to all the 100 days tweets that I posted during the #100DaysOfHacking challenge.☆17Apr 11, 2022Updated 4 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆14Mar 29, 2022Updated 4 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆15Jun 24, 2025Updated 10 months ago
- A Series of Tweets☆15Jan 30, 2024Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- XSS PoCs to elevate your alert()☆23May 18, 2023Updated 3 years ago
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated 2 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Extract domains/subdomains/FQDNs from files and URLs☆20Jun 30, 2020Updated 5 years ago
- ☆48Jan 14, 2024Updated 2 years ago
- ☆16Mar 29, 2024Updated 2 years ago
- my nuclei templates☆41Apr 21, 2024Updated 2 years ago
- Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never resear…☆105Feb 22, 2026Updated 2 months ago
- Custom nuclei templates for bug hunting.....☆26May 30, 2024Updated last year
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆26Dec 7, 2023Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Dec 7, 2025Updated 5 months ago
- Device Tree for Redmi Note 8/8T☆16Jan 18, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- ☆141Nov 9, 2024Updated last year
- Passively check for XSS character encodings☆19Mar 9, 2026Updated 2 months ago
- A subdomain fuzzing tool☆174Jun 1, 2024Updated last year
- A small script to import and ban IPs from a list (like from blocklist.de)☆12Oct 23, 2016Updated 9 years ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆30Nov 7, 2023Updated 2 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 8 months ago
- A tool to migrate Burpsuite HTTP history to Caido☆38Apr 25, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10May 5, 2026Updated 2 weeks ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆104Sep 5, 2023Updated 2 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago