A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.
☆13Aug 28, 2025Updated 5 months ago
Alternatives and similar repositories for fuzzy-httpserver
Users that are interested in fuzzy-httpserver are comparing it to the libraries listed below
Sorting:
- Collection of notes and scripts I used during my OSCP exam preparation.☆40Dec 21, 2025Updated 2 months ago
- BreachHunter is a powerful OSINT (Open Source Intelligence) tool designed for cybersecurity professionals, investigators, and ethical hac…☆22Sep 26, 2025Updated 5 months ago
- # HTB-certified-bug-bounty-hunter-exam-cheetsheet All cheetsheets with main information about CBBH role path in one place.☆26Feb 25, 2024Updated 2 years ago
- BBT - Bug Bounty Tools☆63Jan 12, 2021Updated 5 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆11Jan 18, 2025Updated last year
- A tool for listing and extracting installed Android APKs and decrypted iOS IPAs (plus app storage) from rooted or jailbroken devices.☆39May 5, 2025Updated 9 months ago
- ☆33Feb 27, 2024Updated last year
- Zero Setup is a Bash script that automates the installation process of all the personal tools and software you need on your system. It s…☆12Nov 19, 2023Updated 2 years ago
- Node-Red node for M-Bus protocol☆12Sep 18, 2025Updated 5 months ago
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 4 months ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- ☆14May 14, 2022Updated 3 years ago
- Contains Evoko Home API documentation☆11May 28, 2021Updated 4 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- I used the Templater community plugin in obsidian to automatically populate IP,username,password☆43Sep 11, 2023Updated 2 years ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 7 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- ☆16Aug 25, 2025Updated 6 months ago
- The voting application for moderation elections.☆11May 18, 2017Updated 8 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 6 months ago
- ☆12Aug 25, 2023Updated 2 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- ☆13Dec 23, 2023Updated 2 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- ☆20Jan 25, 2019Updated 7 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆12Oct 16, 2025Updated 4 months ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 4 months ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago