☆26Sep 20, 2022Updated 3 years ago
Alternatives and similar repositories for API-HACKING-RESOURCES
Users that are interested in API-HACKING-RESOURCES are comparing it to the libraries listed below
Sorting:
- ☆27Jul 5, 2023Updated 2 years ago
- ☆112Apr 25, 2023Updated 2 years ago
- ☆42Oct 28, 2021Updated 4 years ago
- Some files for bruteforcing certain things.☆24Jul 12, 2021Updated 4 years ago
- Collection of Facebook Bug Bounty Writeups☆30Sep 16, 2023Updated 2 years ago
- ☆26Feb 21, 2026Updated last week
- Project repository for "Evaluating the persuasive influence of political microtargeting with large language models" by Kobi Hackenburg an…☆11Jun 19, 2024Updated last year
- ☆11Sep 15, 2024Updated last year
- AutoAR is a comprehensive, modular security automation toolkit designed for bug bounty hunters, penetration testers, and security researc…☆54Feb 2, 2026Updated last month
- Protect Your Secrets. Forever. Ultra-secure notes powered by blockchain.☆14Feb 21, 2026Updated last week
- OpenSelfie is an Open Source (hardware and software) photobooth based on the Raspberry Pi and Wyolum's AlaMode☆15Oct 15, 2015Updated 10 years ago
- Notes for OSCP & CPTS.☆72Updated this week
- Sage Math recompiled to run on the Raspberry Pi☆15Oct 9, 2015Updated 10 years ago
- Ver 1.1 by Mike Tucker / published by CreativeApplications.Net☆17Jul 12, 2011Updated 14 years ago
- An application that generates art by inserting text at random points in the image file.☆12Apr 4, 2012Updated 13 years ago
- Web client (static HTML and Javascript) built with Google Web Toolkit☆44Jul 21, 2011Updated 14 years ago
- Encrypted Messaging Protocol Reference Implementation☆26Nov 14, 2017Updated 8 years ago
- Replication materials for "Identifying the Development and Application of Artificial Intelligence in Scientific Text"☆13Feb 18, 2020Updated 6 years ago
- ☆10Oct 6, 2020Updated 5 years ago
- MySQL UDF for inserting data into MongoDB☆16Feb 3, 2012Updated 14 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- ESP32_CAM meets Etch-A-Sketch => Etch-a-Selfie☆12Jul 30, 2019Updated 6 years ago
- Like DLP☆11Jan 27, 2025Updated last year
- ☆28Dec 18, 2025Updated 2 months ago
- ☆12Sep 28, 2025Updated 5 months ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 9 months ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- هذا المستودع هي محاولة منا لاثراء المحتوي العربي بخصوص البج بونتي ومايحتويه من انواع ثغرات الي تقنيات مختلفة الي مصادر متعددة☆38Apr 26, 2022Updated 3 years ago
- A blockstore for ipfs that replaces pinning with counting and tagging☆13Nov 21, 2020Updated 5 years ago
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- Repository for the family history/pedigree project☆13Feb 24, 2026Updated last week
- Shoot and View utility for Transcend WiFi SD card for Windows, Mac and linux.☆11May 16, 2022Updated 3 years ago
- Secure decentralized hierarchical coordination platform☆22Nov 19, 2022Updated 3 years ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Python implementation of the Abelian Sandpile Model (Per Bak, Chao Tang, & Kurt Wiesenfeld, 1987)☆10Apr 19, 2015Updated 10 years ago
- ☆12Jan 17, 2026Updated last month
- Open-source keyboard firmware for Atmel AVR and Arm USB families☆14Jul 30, 2024Updated last year
- Burp-suite Extension For finding .map files☆54Dec 19, 2023Updated 2 years ago