☆27Jul 5, 2023Updated 2 years ago
Alternatives and similar repositories for payloadforall
Users that are interested in payloadforall are comparing it to the libraries listed below
Sorting:
- ☆26Sep 20, 2022Updated 3 years ago
- ☆112Apr 25, 2023Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Analyze an APK archive.☆28Feb 24, 2024Updated 2 years ago
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- Trinetra is Web Crawling Tool For Bug Bounty And Web Pentesters It will Help To Spider Url's From Web And It will Gain Url Info From Web…☆10Nov 29, 2021Updated 4 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- A Django web application for curating Bug Bounty educational Videos☆98Oct 14, 2023Updated 2 years ago
- uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl☆52Nov 3, 2025Updated 4 months ago
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆45Dec 19, 2025Updated 2 months ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- Automated enumeration for red teamers☆10Nov 22, 2022Updated 3 years ago
- Gampung tools for find nuclei template from github☆11Sep 6, 2023Updated 2 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Proxy Management for Security Professionals☆24Mar 25, 2025Updated 11 months ago
- Graphql introspection query analyzer.☆18Mar 28, 2023Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Swift.☆18Feb 13, 2021Updated 5 years ago
- ☆25Aug 19, 2024Updated last year
- Bug Bounty statistics tool.☆33Nov 17, 2022Updated 3 years ago
- Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles☆17Sep 20, 2024Updated last year
- ☆15Feb 6, 2025Updated last year
- GENERATE PYTHON BASED FUD STUB☆19Nov 20, 2023Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Router Vulnerabilities Scanner☆14Jun 1, 2020Updated 5 years ago
- BTLEmap's Bluetooth Low Energy framework that powers the app☆23Dec 8, 2021Updated 4 years ago
- ☆66Jan 14, 2023Updated 3 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆21Sep 30, 2025Updated 5 months ago
- Artemis - C++ Hell's Gate Syscall Implementation☆34Aug 16, 2023Updated 2 years ago
- gh0str3con is a All in one cloud based web Recon tool.☆23Jul 8, 2024Updated last year
- Informatrion Gathering Framework☆22Aug 28, 2022Updated 3 years ago
- https://www.nu11secur1ty.com☆22Feb 15, 2026Updated 2 weeks ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Generate a cross join, also known as a Cartesian product, from the lines of the specified files. This process is useful for creating fuzz…☆21Jun 29, 2023Updated 2 years ago