DevVj-1 / Sub-Ringan-FrameworkLinks
Tool for automate bug hunting process π --> π
β46Updated 5 months ago
Alternatives and similar repositories for Sub-Ringan-Framework
Users that are interested in Sub-Ringan-Framework are comparing it to the libraries listed below
Sorting:
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.β99Updated 2 years ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.β155Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β78Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRβ¦β131Updated last year
- Bug Bounty ultimate toolβ27Updated last month
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.β49Updated this week
- β17Updated 7 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list ofβ¦β49Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutefβ¦β124Updated 11 months ago
- πͺ XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XSβ¦β55Updated 11 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persistβ¦β92Updated last year
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.β257Updated 11 months ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. Iβ¦β161Updated last year
- Automatic tool to find Google Dorksβ36Updated last year
- A tool for automatically change the Tor IP address over time.β117Updated 8 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programmeβ¦β67Updated last year
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.β73Updated last year
- β138Updated 6 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoCβ66Updated last year
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β54Updated 11 months ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extracβ¦β134Updated last year
- π ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.β17Updated 11 months ago
- Welcome to the Bug Hunter's Wordlists repository! ππ This repository serves as a comprehensive collection of essential wordlists utilizβ¦β151Updated last year
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploitedβ22Updated last year
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible paβ¦β65Updated last year
- A New Approach to Directory Bruteforce with WaybackLister v1.0β213Updated 3 months ago
- β19Updated 8 months ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leveβ¦β42Updated 10 months ago
- Bypass 403β163Updated 9 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.β74Updated 4 months ago