☆20Feb 25, 2022Updated 4 years ago
Alternatives and similar repositories for hunt-scanner
Users that are interested in hunt-scanner are comparing it to the libraries listed below
Sorting:
- Swiftly search FDNS datasets from Rapid7 Open Data☆23Nov 20, 2022Updated 3 years ago
- ☆23Mar 3, 2020Updated 6 years ago
- ☆13Sep 21, 2025Updated 5 months ago
- GraphQL security testing tool☆125Mar 31, 2022Updated 3 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Dec 11, 2020Updated 5 years ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆35Feb 27, 2026Updated last week
- A collection of some of my basic ComfyUI workflows. Feel free to build on these.☆12Jun 29, 2024Updated last year
- github信息泄露搜集工具。GSIL升级版,去除发邮件方式,将结果保存在本地☆13Mar 20, 2021Updated 4 years ago
- 0x94TR Burp Extension - Java version☆31Sep 26, 2020Updated 5 years ago
- ☆19Jun 9, 2016Updated 9 years ago
- 四万多条规则,不含广告过滤,避免误杀,内含PAYPAL,TIKTOK,TELEGRAM,YOUTUBE,STREAMING (包含迪士尼奈飞亚马逊等流媒体),WEIBO分组规则,需要自己手动在小火箭里面-全局路由-分组-添加分组,需要以上哪个分组添加哪个,没添加的默认走PR…☆13Feb 4, 2023Updated 3 years ago
- ☆11Oct 10, 2020Updated 5 years ago
- ☆10Dec 29, 2023Updated 2 years ago
- MetricsDAO XYZ Website☆12Nov 1, 2023Updated 2 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- web information gathering / Grab links☆45Nov 1, 2019Updated 6 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Mar 20, 2017Updated 8 years ago
- List of advanced XSS payloads☆86Aug 23, 2016Updated 9 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- How to improve NGINX performance, security, and other important things.☆11Jun 7, 2021Updated 4 years ago
- The burp extension to forward the request☆10Oct 21, 2024Updated last year
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 10 months ago
- ☆20Jan 12, 2022Updated 4 years ago
- Tasks from Hack Battle by SPbCTF at PHDays 9☆10Mar 20, 2021Updated 4 years ago
- A template for running Stable Diffusion 3 with Cog☆14Aug 20, 2024Updated last year
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 4 months ago
- Command line tool for testing CRLF injection on a list of domains.☆164Apr 14, 2024Updated last year
- A rewrite of the popular altDNS subdomain tool by @infosec-au☆12Feb 28, 2019Updated 7 years ago
- OpenAPI Specification v2.0 to Excel☆10Apr 8, 2021Updated 4 years ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- 👀 All-Seeing Eye: Arbitrary File Read Vulnerability in Chrome Versions Prior to 116☆10Nov 18, 2023Updated 2 years ago
- a simplify app extractor☆10Dec 26, 2018Updated 7 years ago
- PC远控winos4.0成品☆12Sep 13, 2023Updated 2 years ago
- A tool to do basic fingerprinting across a large number of hosts☆11Oct 20, 2020Updated 5 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago