SaadAhmedx / Mass-Bucket-ExploiterView external linksLinks
☆10May 12, 2017Updated 8 years ago
Alternatives and similar repositories for Mass-Bucket-Exploiter
Users that are interested in Mass-Bucket-Exploiter are comparing it to the libraries listed below
Sorting:
- ☆20Aug 19, 2024Updated last year
- "What To" guide for finding vulnerabilities in sites.☆21Jul 22, 2017Updated 8 years ago
- Spring Boot Actuator (jolokia) XXE/RCE☆23Mar 10, 2019Updated 6 years ago
- dork scanner with Sqli and Lfi testing☆28Apr 29, 2018Updated 7 years ago
- Personal Portfolio Static HTML Pages☆11Updated this week
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Jan 7, 2020Updated 6 years ago
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- A PHP web interface for monitoring system resources on Linux servers.☆10Jun 30, 2016Updated 9 years ago
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated 3 weeks ago
- Analyze apache log and display histograms and stats about the requests, in order to identify main problematic urls☆17Nov 10, 2025Updated 3 months ago
- Web Information Gathering☆18Feb 23, 2015Updated 10 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 4 months ago
- Just an automation script to delete/unsend fb messages. Inspired from: @pishangujeniya/instagram-helper☆10Jul 31, 2022Updated 3 years ago
- track your food!☆11Feb 8, 2017Updated 9 years ago
- Homo Network - The best ddos botnet in 2023☆12Apr 27, 2023Updated 2 years ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11May 31, 2023Updated 2 years ago
- A restaurant web app for campuses with e-Wallet☆11Mar 31, 2017Updated 8 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- ☆12Feb 1, 2022Updated 4 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- Simple Webserver Implementation using Sockets☆15Dec 8, 2022Updated 3 years ago
- A simple example of botnet using IPFS and IPNS protocols as way for controller of botnet☆17May 4, 2018Updated 7 years ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆13Nov 20, 2025Updated 2 months ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- ☆13Nov 17, 2021Updated 4 years ago
- My OSCP cheat sheet☆21Aug 4, 2024Updated last year
- Easy setup for Halo2 ZK circuits☆15Jun 6, 2024Updated last year
- Computer Science (data structures, algorithms), challenges solutions from LeetCode, Advent Of Code, Project Euler etc.☆12Oct 25, 2025Updated 3 months ago
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- ☆14Feb 5, 2026Updated last week
- uploads unlimited files to mega.nz without a subscription☆13Aug 13, 2025Updated 6 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆22Dec 31, 2025Updated last month
- sap netweaver 0day poc by shinyhunters (scattered lapsus$ hunters) affecting all 7.x CVE-2025-31324☆20Aug 15, 2025Updated 5 months ago
- DTrackAuditor is the python script to faciliate usage of DependencyTrack in the CI.☆11Apr 28, 2025Updated 9 months ago
- ☆12Jan 29, 2022Updated 4 years ago
- mega.nz direct link generator☆17Jun 19, 2025Updated 7 months ago