Hakumarachi / Loose-Compare-TablesLinks
A complete table of results of types comparison in multiple languages
☆34Updated 2 years ago
Alternatives and similar repositories for Loose-Compare-Tables
Users that are interested in Loose-Compare-Tables are comparing it to the libraries listed below
Sorting:
- Some tips for Bug Bounty using LibreOffice☆48Updated 6 months ago
- ☆90Updated last month
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 7 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆90Updated last month
- Azure mindmap for penetration tests☆188Updated last year
- ☆143Updated last year
- Session Hijacking Visual Exploitation☆205Updated last year
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆46Updated last year
- ☆79Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 5 months ago
- A Burp extension to help pentesters copy requests / responses for reports.☆49Updated 2 months ago
- ☆84Updated 2 months ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆96Updated last month
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 7 months ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆105Updated 3 months ago
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆77Updated 6 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆58Updated 2 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆378Updated 4 months ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 4 months ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆108Updated 2 years ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Updated 9 months ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆71Updated 2 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆61Updated 2 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆178Updated last year
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆101Updated 2 months ago
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆138Updated 9 months ago
- Everything and anything related to password spraying☆145Updated last year