Hipapheralkus / AIAIAI
An Incredibly Annoying, Insufferable Authentication Implementation
☆30Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for AIAIAI
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆74Updated 3 months ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆34Updated this week
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆52Updated 2 months ago
- A really fast http prober.☆39Updated 9 months ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆78Updated last year
- ☆53Updated 11 months ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Updated 8 months ago
- A Burp extension to help pentesters copy requests / responses for reports.☆34Updated 4 months ago
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆57Updated 2 months ago
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆84Updated 9 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆27Updated 10 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆117Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆57Updated last year
- Mine URLs from Browser's Heap Snapshot for fun and profit☆63Updated last year
- Workshop & Talk Slide Decks from HackSpaceCon☆24Updated 5 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆46Updated 3 weeks ago
- ☆18Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- ☆52Updated last month
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆34Updated last year
- Finds graphql queries in javascript files☆57Updated 5 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆21Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆52Updated 2 weeks ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆79Updated last month
- ☆26Updated 2 months ago
- ☆32Updated this week
- A powerful bash script for massive XSS scanning leveraging Brute Logic's KNOXSS API☆58Updated last month
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆29Updated 7 months ago