🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages
☆26Jan 31, 2026Updated last month
Alternatives and similar repositories for Dependency-Confusion-Hunter
Users that are interested in Dependency-Confusion-Hunter are comparing it to the libraries listed below
Sorting:
- Detection for CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039☆47Dec 15, 2025Updated 3 months ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 8 months ago
- ☆11Aug 10, 2021Updated 4 years ago
- ☆72Nov 7, 2025Updated 4 months ago
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆25Mar 10, 2026Updated last week
- Find The Admin Panel & SQL Injection Endpoints, Using Google Dorks !!!☆26Nov 15, 2024Updated last year
- ☆48Oct 1, 2025Updated 5 months ago
- a curated list of shodan dorks for finding sensitive data in shodan.io☆39Jul 14, 2024Updated last year
- A tool to migrate Burpsuite HTTP history to Caido☆35Apr 25, 2025Updated 10 months ago
- ☆11Dec 27, 2023Updated 2 years ago
- ☆21Nov 21, 2023Updated 2 years ago
- Various BPF resources, tools, scripts and experiments created while learning more about the eBPF technology.☆21Jul 11, 2022Updated 3 years ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated 2 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Mar 10, 2026Updated last week
- A shortlist of core ServiceNow tables.☆15Oct 16, 2023Updated 2 years ago
- Exploring Pegasus Spyware: A Deep Dive☆10Nov 25, 2023Updated 2 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆44Sep 22, 2024Updated last year
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Bug bounty domain manager with validation, exports & Redis storage ✨☆29Jun 5, 2025Updated 9 months ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- A collection of my public security advisories.☆28Nov 10, 2025Updated 4 months ago
- ☆12Feb 10, 2026Updated last month
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- ☆12Feb 20, 2025Updated last year
- API for Asset Service☆15Aug 15, 2024Updated last year
- Solutions to Codewars katas☆11Jun 1, 2019Updated 6 years ago
- A blockchain consensus protocol fuzzing framework☆20Jun 12, 2023Updated 2 years ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- Read All Medium Articles for free for ever...........☆17Oct 26, 2023Updated 2 years ago
- Showcase the books you have read.☆10Oct 2, 2017Updated 8 years ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 5 months ago
- 🌍 My website☆10Nov 23, 2025Updated 3 months ago
- Quickly fuzz URLs and scan for secrets directly in your browser tabs☆52Oct 25, 2025Updated 4 months ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- ☆18Jul 11, 2021Updated 4 years ago
- A medium hack to read free with auto incognito.☆17Nov 12, 2018Updated 7 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- AircrackNG commands guide☆21Jun 24, 2018Updated 7 years ago