Hakumarachi / Loose-Compare-TablesLinks
A complete table of results of types comparison in multiple languages
☆35Updated 3 years ago
Alternatives and similar repositories for Loose-Compare-Tables
Users that are interested in Loose-Compare-Tables are comparing it to the libraries listed below
Sorting:
- Some tips for Bug Bounty using LibreOffice☆52Updated 8 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 9 months ago
- ☆92Updated 3 months ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆98Updated 7 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆96Updated 2 months ago
- Azure mindmap for penetration tests☆190Updated last year
- ☆101Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 8 months ago
- PP-finder Help you find gadget for prototype pollution exploitation☆180Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆111Updated 2 years ago
- A Burp extension to help pentesters copy requests / responses for reports.☆50Updated 3 months ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆100Updated 3 months ago
- ☆144Updated last year
- LFI to RCE via phpinfo() assistance or via controlled log file☆72Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆108Updated 5 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆61Updated 4 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆149Updated 10 months ago
- Blazing fast, advanced Padding Oracle exploit☆257Updated last month
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆75Updated last year
- Everything and anything related to password spraying☆148Updated last year
- ☆85Updated 4 months ago
- ☆172Updated 2 months ago
- Becoming the spider, crawling through the webs to catch the fly.☆78Updated 4 years ago
- Session Hijacking Visual Exploitation☆208Updated last year
- Custom scan profiles for use with Burp Suite Pro☆147Updated last year
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆80Updated 7 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆127Updated 3 years ago