Nuclei Pre-Master Template Downloader
☆22Aug 8, 2024Updated last year
Alternatives and similar repositories for gitPullScrapper
Users that are interested in gitPullScrapper are comparing it to the libraries listed below
Sorting:
- ☆18Jan 8, 2025Updated last year
- is a tool to automate and organize reconnaissance operations.☆24Sep 6, 2023Updated 2 years ago
- Port scanning is crucial in recon, but running it manually on big scopes? Nope. That’s why I made Nmap Bomber a Python script that runs f…☆40Jul 31, 2025Updated 7 months ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- collectvars collects JavaScript variables, highlights risky ones, and helps you understand code structure, while you casually browse.☆33Aug 28, 2024Updated last year
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆30Apr 17, 2024Updated last year
- Find private tracks on soundcloud by bruteforcing shareable links☆13Apr 24, 2024Updated last year
- ☆11Sep 15, 2024Updated last year
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- ☆18May 11, 2021Updated 4 years ago
- ☆11Updated this week
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 3 months ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆38Aug 14, 2024Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 4 months ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- USB rubber ducky reverse shell with disabling windows defender☆12Apr 17, 2021Updated 4 years ago
- ☆11Nov 22, 2021Updated 4 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Welcome to h4cker_b00k, a sheet where the write up's of different CTF's are to learn ethical hacking...☆15Feb 23, 2026Updated last week
- Script Open Source Facebook Crack Indonesia👾💥☆12Jan 6, 2024Updated 2 years ago
- A simple Arduino Library to send message on Discord using webhook☆14Feb 25, 2025Updated last year
- ☆10Mar 11, 2024Updated last year
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 3 years ago
- RobinHood - Bug Hunting Recon Automation Script☆37Nov 18, 2022Updated 3 years ago
- Tools and methods that I personally use for Recon and Exploitations☆49May 1, 2025Updated 10 months ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- Generate common Reverse Shells for Pentesting☆44May 23, 2021Updated 4 years ago
- Recon for Pentesting and BugBounty 🕵️☆14Jan 14, 2026Updated last month
- 资产测绘输出xlsx表格☆14Sep 10, 2024Updated last year
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- ☆12Nov 17, 2024Updated last year
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- SMS4 Decrypt☆11Dec 23, 2020Updated 5 years ago
- ☆15Apr 20, 2023Updated 2 years ago