Target practice for ffuf
☆73Aug 10, 2021Updated 4 years ago
Alternatives and similar repositories for ffufme
Users that are interested in ffufme are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Misc stuff from internet☆12Apr 13, 2026Updated 3 weeks ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- The Primate Pack is a suite of extensions for Caido.☆14Sep 29, 2024Updated last year
- Custom scripts for the PIPER Burp extensions.☆97Sep 24, 2023Updated 2 years ago
- ☆15Mar 21, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆22Jul 16, 2021Updated 4 years ago
- Recon Custom WordList Ganerator☆59Jul 2, 2020Updated 5 years ago
- ☆44Jul 23, 2021Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- ☆16Jun 26, 2025Updated 10 months ago
- Simple vulnerability labs that created using PHP and MySQL.☆16Dec 30, 2022Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Describe how to use ffuf different options with examples☆91Dec 11, 2022Updated 3 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆56Jun 14, 2021Updated 4 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- Built on a lazy Sunday after seeing this tweet (https://twitter.com/intigriti/status/1272145863868104705?s=20) I present to you, Paramete…☆52Jun 14, 2020Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Here I am trying to show you some cheat-sheet of nmap. Which may help you on penetration testing and bug hunting.☆20Dec 20, 2021Updated 4 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- Notes Template/Checklist for PEN-300 OSEP☆17Nov 20, 2021Updated 4 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆278Jan 28, 2025Updated last year
- Hacked together script for feeding urls into Burp's Sitemap☆94Dec 7, 2025Updated 4 months ago
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Jun 3, 2021Updated 4 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 5 years ago
- Quickly collect data from thousands of exposed Elasticsearch or Kibana instances and generate a report to be analysed.☆30Jan 7, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Extract endpoints from source files.☆25Mar 28, 2023Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆159Mar 31, 2025Updated last year
- A collection oneliner scripts for bug bounty☆185Mar 21, 2024Updated 2 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Reversing Citrix Gateway for XSS☆17Jul 3, 2023Updated 2 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago