Official API Documentation
☆33Jun 29, 2025Updated 8 months ago
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below
Sorting:
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆15Apr 10, 2025Updated 11 months ago
- fscan结果优化,更新DC域筛选☆10Nov 21, 2023Updated 2 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- 日常积累的一些红队工具及自己写的脚本,更偏向于一些diy的好用的工具,并不是一些比较常用的msf/awvs/xray这种☆10Sep 5, 2020Updated 5 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆23Jun 25, 2023Updated 2 years ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- ☆11Jun 30, 2025Updated 8 months ago
- Nuclei plugin for BurpSuite☆15Nov 29, 2024Updated last year
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- 本分支解决部分爱加密加固应用无法脱壳成功的问题。演示视频https://pan.baidu.com/s/1HH_-TQGca1NLoSqzvOPB3Q 密码:izm3☆16Dec 27, 2019Updated 6 years ago
- ☆17Dec 14, 2022Updated 3 years ago
- Deception implementation through analysis of BloodHound data☆55Oct 9, 2025Updated 5 months ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- WebSocket 内存马/Webshell,一种新型内存马/WebShell技术☆22Apr 10, 2023Updated 2 years ago
- Fetches security vulnerabilities and creates pip-constraints based on them.☆12Jan 27, 2025Updated last year
- Extracting strings from binary data☆12Sep 30, 2024Updated last year
- List of HTB v4 APIs☆16Oct 19, 2024Updated last year
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- Package URL implementation for Rust☆14Dec 8, 2025Updated 3 months ago
- Screendown - 📸 Capture stunning screenshots of your Markdown or code directly in Visual Studio Code with ease.☆25Jan 10, 2024Updated 2 years ago
- Multi-threading Leaks/Intelligence file parser☆15Updated this week
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- Use fzf with a config file + others goodies☆15Nov 13, 2022Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- ☆27Mar 6, 2025Updated last year
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- Python package for handling CI and other integrations☆10Updated this week
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- The following include a list of pentest tools available across the web. Many are free and even open source, others are premium tools and …☆49Aug 1, 2025Updated 7 months ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆32Dec 30, 2020Updated 5 years ago
- A chronological (up to the century in which the poet has lived) of Persian poetry, extracted from the brilliant Ganjoor database☆18Jan 31, 2021Updated 5 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago