De3vil / someawesomeLinks
☆12Updated 2 years ago
Alternatives and similar repositories for someawesome
Users that are interested in someawesome are comparing it to the libraries listed below
Sorting:
- Simple recon tool automates your recon process☆17Updated 2 years ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last year
- 「🐞」Bug Bounty Tricks☆39Updated last year
- ☆14Updated 3 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- an exploit of Server-side request forgery (SSRF)☆50Updated 10 months ago
- 「📖」Tool created to extract metadata from a domain☆14Updated 6 months ago
- xdebug 2.5.5 RCE exploit☆31Updated 5 months ago
- ☆25Updated 2 years ago
- This tool is designed to detect and identify Server-Side Template Injection (SSTI) vulnerabilities in web applications☆8Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- Brute forcing login pages with SQL Injection queries with cURL☆20Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Automate your subdomain enumeration, subdomain takeover, management, nuclei, etc. in one go.☆10Updated 3 years ago
- Enumeration & fingerprint tool☆25Updated last year
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- ☆21Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- https://www.nu11secur1ty.com☆23Updated last month
- Just another script for automatize boolean-based blind SQL injections. (Demo)☆54Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- ☆44Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 10 months ago
- Template Nuclei SSTI☆30Updated last year