☆22Mar 18, 2024Updated last year
Alternatives and similar repositories for Walkthroughs
Users that are interested in Walkthroughs are comparing it to the libraries listed below
Sorting:
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 9 months ago
- ☆11Jun 10, 2025Updated 8 months ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 4 months ago
- ☆46Nov 22, 2025Updated 3 months ago
- Don't just be a script Kiddie☆11Apr 19, 2023Updated 2 years ago
- This is my personal blog where I talk about science and technology, especially about offensive cybersecurity.☆12Dec 28, 2025Updated 2 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- ☆10May 12, 2017Updated 8 years ago
- A collection of python cybersecurity projects☆47Jan 27, 2024Updated 2 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 2 years ago
- ☆13Nov 17, 2021Updated 4 years ago
- Simple Webserver Implementation using Sockets☆15Dec 8, 2022Updated 3 years ago
- Easy setup for Halo2 ZK circuits☆15Jun 6, 2024Updated last year
- ☆13Oct 24, 2024Updated last year
- XSS payloads for bypassing WAF. This repository is updating continuously.☆10Aug 8, 2021Updated 4 years ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆14Jun 4, 2025Updated 8 months ago
- Automated tool for domains & Subdomains Gathering☆14Updated this week
- After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and AndroidOS systems I have created tools t…☆15Oct 25, 2021Updated 4 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆14Jan 23, 2023Updated 3 years ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16May 8, 2025Updated 9 months ago
- ☆13Mar 15, 2022Updated 3 years ago
- simple network signature/rule intrusion detection system written in Python.☆15Jun 10, 2024Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- ☆15Apr 4, 2022Updated 3 years ago
- A repository that includes all the important wordlists used while bug hunting.☆20Oct 12, 2021Updated 4 years ago
- Linkfinder by Rdzsp is a browser extension that automatically scans and collects endpoints from JavaScript files on websites☆32Aug 22, 2024Updated last year
- Solidity bytecode mapping for caller authorization☆20Jul 12, 2022Updated 3 years ago
- Zabbix - SAML SSO Authentication Bypass☆15Mar 31, 2022Updated 3 years ago
- A Web Application Penetration Testing Framework build in React with an Node/Express/MongoDB back-end☆25Mar 7, 2023Updated 2 years ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆20Apr 30, 2025Updated 10 months ago
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- Informer is a OSINT information gathering tool that gathers whois, Sub-domain ,DNS, geolocation and shodan information of the target.☆20Nov 8, 2022Updated 3 years ago
- Payload generator to exfiltrate user cookies through the PHP info page bypassing the HttpOnly flag during XSS exploitation.☆20Dec 20, 2023Updated 2 years ago