Detection Script for MongoBleed Exploitation
☆79Jan 2, 2026Updated 4 months ago
Alternatives and similar repositories for mongobleed-detector
Users that are interested in mongobleed-detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.☆124Dec 29, 2025Updated 4 months ago
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆44Dec 4, 2025Updated 5 months ago
- This repo collects nuclei template from 600+ github repos, updates every 6 hours.☆36Feb 17, 2026Updated 2 months ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 7 months ago
- ☎️ xTELENUMSINT - A powerful new Chrome extension for Telephone OSINT (NUMSINT) that automates searches in Google using 10 different form…☆74Mar 28, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆34Jan 4, 2026Updated 4 months ago
- My-custom-sensitive-info-disclsure-nuclei-template☆31Jan 3, 2026Updated 4 months ago
- A set of tools and resources for analysis of Havoc C2☆28Feb 27, 2024Updated 2 years ago
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆83Nov 20, 2025Updated 5 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 3 months ago
- this nuclei template finds back up files☆23Aug 25, 2025Updated 8 months ago
- ☆72May 5, 2025Updated last year
- Some of the gf patterns which i use☆44Jan 19, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Grafana scanner with all public CVEs that I collected in one script to make grafana testing easier☆76Feb 15, 2026Updated 2 months ago
- ☆15Feb 6, 2025Updated last year
- ☆14Feb 12, 2026Updated 2 months ago
- .NET tool used to enrich RPC telemetry☆102Jan 24, 2026Updated 3 months ago
- Use claude code anywhere.☆62Apr 19, 2026Updated 2 weeks ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆19Feb 20, 2026Updated 2 months ago
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Apr 12, 2026Updated 3 weeks ago
- Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.☆46Feb 10, 2026Updated 2 months ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆49Feb 6, 2026Updated 3 months ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- My collection of hacking books for learning information security☆32Dec 25, 2022Updated 3 years ago
- Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)☆95Apr 2, 2025Updated last year
- ☆21Apr 16, 2026Updated 2 weeks ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Reverse engineer obfuscated JavaScript visually. Chain transforms, inspect AST changes, write reusable deobfuscation plugins.☆114Feb 4, 2026Updated 3 months ago
- ☆34Apr 16, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- List of Fresh DNS resolvers updates every 1 hour☆19Updated this week
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 8 months ago
- Fitness OSINT Resources☆16Jul 21, 2023Updated 2 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- ☆34Jan 18, 2026Updated 3 months ago