Target practice for ffuf
☆70Aug 10, 2021Updated 4 years ago
Alternatives and similar repositories for ffufme
Users that are interested in ffufme are comparing it to the libraries listed below
Sorting:
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- ☆23Nov 29, 2023Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last week
- ☆15Mar 21, 2025Updated 11 months ago
- Recon Custom WordList Ganerator☆58Jul 2, 2020Updated 5 years ago
- The jailbreak-evaluation is an easy-to-use Python package for language model jailbreak evaluation.☆27Nov 4, 2024Updated last year
- ☆22Jul 16, 2021Updated 4 years ago
- Built on a lazy Sunday after seeing this tweet (https://twitter.com/intigriti/status/1272145863868104705?s=20) I present to you, Paramete…☆51Jun 14, 2020Updated 5 years ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆153Mar 31, 2025Updated 11 months ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- ☆13Jun 26, 2025Updated 8 months ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- ☆10Jan 17, 2022Updated 4 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- DNSCat PNG Extractor is a Python tool designed for the extraction of PNG image data from DNS exfiltration attempts using DNScat☆10Nov 15, 2023Updated 2 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- ☆44Jul 23, 2021Updated 4 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆12Feb 10, 2013Updated 13 years ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- ☆11Dec 17, 2023Updated 2 years ago
- Various things to share☆11Sep 22, 2018Updated 7 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆106Aug 6, 2022Updated 3 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Jun 14, 2021Updated 4 years ago
- Custom scripts for the PIPER Burp extensions.☆97Sep 24, 2023Updated 2 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆13Apr 26, 2023Updated 2 years ago