Hakumarachi / Loose-Compare-TablesLinks
A complete table of results of types comparison in multiple languages
☆35Updated 3 years ago
Alternatives and similar repositories for Loose-Compare-Tables
Users that are interested in Loose-Compare-Tables are comparing it to the libraries listed below
Sorting:
- Some tips for Bug Bounty using LibreOffice☆51Updated 7 months ago
- ☆90Updated 2 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 8 months ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 6 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆58Updated 3 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆93Updated last month
- ☆95Updated last year
- ☆143Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- A Burp extension to help pentesters copy requests / responses for reports.☆49Updated 3 months ago
- Azure mindmap for penetration tests☆189Updated last year
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆106Updated 4 months ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆99Updated 2 months ago
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆105Updated 3 months ago
- Session Hijacking Visual Exploitation☆207Updated last year
- LFI to RCE via phpinfo() assistance or via controlled log file☆70Updated 2 years ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Updated 10 months ago
- TUDO - A vulnerable PHP Web Application☆122Updated 2 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆178Updated last year
- ☆85Updated 3 months ago
- Adobe Experience Manager (AEM) hacking toolkit☆76Updated 2 weeks ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 8 months ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆108Updated 2 years ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆138Updated 10 months ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆25Updated last year
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆202Updated 10 months ago
- SSTI Payload Generator☆91Updated 3 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 5 months ago