Monitoring for leaks of sensitive information in git repositories
☆43Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for hungryfox
Users that are interested in hungryfox are comparing it to the libraries listed below
Sorting:
- Customizable Security Scanner written in Go☆16Jul 6, 2016Updated 9 years ago
- Identify vulnerabilities in your API's using the OpenAPI Security Scanner☆12Dec 6, 2018Updated 7 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- A Lua/Python Bytecode Disassembler written in C, without external dependencies☆13Mar 28, 2017Updated 8 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- All the information provided on this site is for educational purposes only.☆18Feb 27, 2024Updated 2 years ago
- Collection of tech talks from Gett and Juno engineers☆15Jul 4, 2019Updated 6 years ago
- ☆15Oct 1, 2020Updated 5 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 4 years ago
- Deeplack is a python script designed for comparing images (screenshots) using DeepAI to detect changes on websites.☆14Jun 19, 2019Updated 6 years ago
- Go library to scrape torrents on any UDP tracker☆18Jul 31, 2018Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit☆51Sep 26, 2019Updated 6 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 7 years ago
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Jul 10, 2020Updated 5 years ago
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆58Jul 26, 2020Updated 5 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Nov 22, 2017Updated 8 years ago
- List out all of payload for security testing☆25May 2, 2022Updated 3 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Jan 25, 2026Updated last month
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- CVE-2019-15107 Webmin RCE (unauthorized)☆65Sep 2, 2019Updated 6 years ago
- Full TTY reverse shell over SSH☆59Jul 14, 2020Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago
- CTF write-ups by PDKT team with English and Indonesian language☆75Jun 3, 2019Updated 6 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Mar 13, 2019Updated 6 years ago
- ffmpeg exploitation tool☆27Aug 3, 2016Updated 9 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago