NC-Elbow / DPU140Links
☆7Updated 7 years ago
Alternatives and similar repositories for DPU140
Users that are interested in DPU140 are comparing it to the libraries listed below
Sorting:
- Convolutional neural network for analyzing pentest screenshots☆1,229Updated last year
- ☆818Updated last year
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆894Updated 6 months ago
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,258Updated 2 months ago
- Dynamically deploy containers for CTF challenges.☆15Updated 4 months ago
- ☆599Updated last year
- A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.☆718Updated last year
- Wordlists that have been compiled using Commonspeak2. This repo is updated every time new wordlists are generated.☆535Updated 6 years ago
- Setup script for Regon-ng☆933Updated 4 years ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,066Updated 2 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,532Updated 2 years ago
- A DNS rebinding attack framework.☆1,137Updated 2 weeks ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,128Updated 2 months ago
- MassDNS wrapper written in go to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard filtering…☆1,453Updated 2 weeks ago
- AppSec Ezine Public Repository.☆1,182Updated last week
- Unleash the power of cloud☆776Updated 7 months ago
- Subdomain Takeover tool written in Go☆1,984Updated last year
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,012Updated 4 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆627Updated last week
- CT Log Scanner☆382Updated 3 months ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,241Updated last year
- Hackish way to intercept and modify non-HTTP protocols through Burp & others.☆608Updated last year
- Finds unknown classes of injection vulnerabilities☆692Updated 2 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆876Updated last year
- A rapid API for the Project Sonar dataset☆653Updated 2 years ago
- jxscout superpowers JavaScript analysis for security researchers☆214Updated last month
- Exploitation for XSS☆721Updated 3 years ago
- Differential testing framework for HTTP implementations☆838Updated this week
- The most exhaustive list of reliable DNS resolvers.☆804Updated last week
- ☆31Updated last year