Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!
☆154Sep 23, 2025Updated 5 months ago
Alternatives and similar repositories for Task-Ninja
Users that are interested in Task-Ninja are comparing it to the libraries listed below
Sorting:
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Aug 14, 2025Updated 6 months ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆56Oct 23, 2024Updated last year
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆245Mar 28, 2024Updated last year
- Generator of static files(csv, jpeg, png, pdf) for testing file upload. It can generate csv and png files of any number of bytes!☆67Feb 12, 2025Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- ☆10Apr 6, 2024Updated last year
- A fast subdomain takeover tool☆85Nov 10, 2023Updated 2 years ago
- A BurpSuite extension for vulnerability Scanning☆29Feb 16, 2024Updated 2 years ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆311Mar 31, 2024Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆152May 17, 2024Updated last year
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆140Oct 15, 2025Updated 4 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Oct 28, 2025Updated 4 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last week
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- ☆520Apr 29, 2024Updated last year
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆16Jun 27, 2022Updated 3 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,497Jan 8, 2026Updated last month
- This is a useful Python script for extracting bug bounty or any other write-ups from every RSS.☆141Nov 21, 2025Updated 3 months ago
- ☆145Apr 25, 2024Updated last year
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆229May 20, 2025Updated 9 months ago
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆434Oct 16, 2025Updated 4 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,294Aug 7, 2025Updated 6 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 3 months ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆500Jun 28, 2025Updated 8 months ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆247Mar 17, 2025Updated 11 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Dec 5, 2023Updated 2 years ago
- Never forget where you inject.☆298Aug 15, 2025Updated 6 months ago
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆233Feb 2, 2026Updated last month
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Mar 7, 2024Updated last year
- how to look for Leaked Credentials !☆1,034May 6, 2024Updated last year
- De-clutter a list of URLs☆385Feb 3, 2026Updated last month
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆148Feb 21, 2024Updated 2 years ago
- A simple tool for bypassing file upload restrictions.☆893Jul 22, 2024Updated last year
- Bcheck scripts for Burp☆28Aug 7, 2024Updated last year