Hakumarachi / Loose-Compare-TablesLinks
A complete table of results of types comparison in multiple languages
☆32Updated 2 years ago
Alternatives and similar repositories for Loose-Compare-Tables
Users that are interested in Loose-Compare-Tables are comparing it to the libraries listed below
Sorting:
- Some tips for Bug Bounty using LibreOffice☆47Updated 4 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 5 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆152Updated 5 months ago
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆68Updated 3 weeks ago
- ☆88Updated 3 months ago
- Azure mindmap for penetration tests☆186Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 3 months ago
- ☆140Updated last year
- Session Hijacking Visual Exploitation☆201Updated last year
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 7 months ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- ☆171Updated last month
- Everything and anything related to password spraying☆142Updated last year
- PP-finder Help you find gadget for prototype pollution exploitation☆165Updated 11 months ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆91Updated 2 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆54Updated 2 weeks ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆98Updated 2 years ago
- ☆81Updated 3 weeks ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆62Updated 2 months ago
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆197Updated 8 months ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆134Updated 7 months ago
- A better way of querying certificate transparency logs☆87Updated 3 months ago
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆71Updated 4 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆110Updated this week
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆75Updated last year
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆375Updated 2 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆145Updated 7 months ago