π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.
β55Dec 23, 2024Updated last year
Alternatives and similar repositories for lfier
Users that are interested in lfier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- πͺ XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XSβ¦β55Dec 30, 2024Updated last year
- β‘ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.β56Updated this week
- π€ The Modern, Blazing Fast Port Scanner π€β28Dec 29, 2024Updated last year
- Interactive simulation of a fictional ransomware group's dashboardβ12Sep 30, 2024Updated last year
- Automate Recon XSS Bug Bountyβ182Mar 9, 2026Updated 2 weeks ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- β44Jan 22, 2026Updated 2 months ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities π΅οΈββοΈ using Metasploit π. Learn how to idβ¦β12May 25, 2025Updated 10 months ago
- Web Crawler for Identifying Entry Pointsβ11Mar 26, 2024Updated 2 years ago
- CrlfiXβ21Jan 30, 2025Updated last year
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.β13Aug 20, 2024Updated last year
- Speed up your pentest enumerationβ82Oct 5, 2025Updated 5 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.β37Jul 27, 2025Updated 7 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Supportβ36May 29, 2024Updated last year
- MetaX - Advanced XSS Vulnerability Detectorβ15Dec 30, 2025Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Developing an open source Windows EDR written in C & C++ & C#β28Updated this week
- Never forget where you inject.β299Aug 15, 2025Updated 7 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacyβ¦β17Dec 25, 2024Updated last year
- Creating a LLM Powered PDF Reader with RAGβ22Mar 6, 2025Updated last year
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking forβ¦β15Jun 4, 2025Updated 9 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.β52Feb 22, 2024Updated 2 years ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.β129Dec 15, 2025Updated 3 months ago
- blogβ24Mar 9, 2026Updated 2 weeks ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github β¦β21Aug 11, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- SpideyX a multipurpose Web Penetration Testing tool with asynchronous concurrent performance with multiple mode and configurations.β191Mar 18, 2025Updated last year
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defenseβ¦β32Mar 6, 2025Updated last year
- An advanced JWT extraction & decoding tool for bug bounty hunters! π΄ββ οΈβ45Mar 24, 2025Updated last year
- Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)β14Oct 12, 2021Updated 4 years ago
- Create your own certification authority with server certificates in a full automated wayβ29Aug 29, 2025Updated 6 months ago
- This script can be used to find html forms in the list of endpoints/urls.β50Mar 24, 2024Updated 2 years ago
- β39Oct 18, 2024Updated last year
- Identify the accounts most vulnerable to dictionary attacksβ121Apr 2, 2025Updated 11 months ago
- This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specifiβ¦β21Jul 9, 2024Updated last year
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ThreatSeeker: Threat Hunting via Windows Event Logsβ124May 16, 2023Updated 2 years ago
- Ψ§ΩΩ Ψ§Ψ―Ψ§Ψ© Ψ―Ψ―ΩΨ³ Ψ§ΨͺΨ§Ω ΨΉΨ±Ψ¨ΩΩ π±πΎβ26Jun 18, 2024Updated last year
- A basic Bug Bounty target monitoring tool based on Discord Botβ23Jan 30, 2025Updated last year
- Automated daily scan using Nmap and report on the differencesβ21Mar 12, 2018Updated 8 years ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queriesβ¦β29Aug 4, 2025Updated 7 months ago
- Black Hat Python: Python for Pentesters, by EC-Councilβ34Jun 20, 2024Updated last year
- β21Aug 3, 2022Updated 3 years ago