Creates date-based wordlists that can be used for penetration testing, QA fixtures, or any workflow that needs exhaustive date coverage.
☆16Mar 25, 2026Updated last month
Alternatives and similar repositories for Chronogen
Users that are interested in Chronogen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆19Nov 29, 2024Updated last year
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- Here we are gather all Nuclei Templates that are Publically available.☆15Apr 28, 2024Updated 2 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆26Aug 21, 2023Updated 2 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Java + Native 全自动 SSL Pinning 绕过脚本(Universal SSL Pinning Bypass Script (Java & Native Combined))☆57Apr 26, 2026Updated last week
- BLEMystique is an ESP32 based custom BLE target☆14Dec 30, 2018Updated 7 years ago
- A redesigned ErgoDox keyboard☆12Sep 1, 2020Updated 5 years ago
- Reconnaissance & Footprinting framework for BugHunters & RedTeamers☆20Aug 15, 2025Updated 8 months ago
- Reverse Engineering Frida for Beginners, by EC-Council☆14Sep 21, 2023Updated 2 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆21Dec 22, 2022Updated 3 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- List of OSINT Capture The Flag platforms☆56Mar 27, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Config for HP Elitebook Hackintosh for macOS Sierra 10.13.2.☆16Jan 12, 2018Updated 8 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Aug 4, 2023Updated 2 years ago
- Burp extention to automatically generate OpenAPI Json for Swagger from proxy traffic☆23Aug 3, 2022Updated 3 years ago
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆30Jul 30, 2024Updated last year
- A Python script to find tenant id an region from a list of domain names.☆21Jan 31, 2025Updated last year
- Extract the best title value from within HTML head elements.☆17Apr 17, 2023Updated 3 years ago
- A Web Application Penetration Testing Framework build in React with an Node/Express/MongoDB back-end☆25Mar 7, 2023Updated 3 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Insecure Firebase | Bugbounty | Hacking Insecure Firbase☆90Sep 2, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- GNOME Shell extension to easily manage usual snap tasks☆12May 28, 2022Updated 3 years ago
- Pwny Cup 2K24 quals challenges writeups☆14Nov 9, 2024Updated last year
- LFI Payloads List coolected from github repos☆88May 9, 2020Updated 5 years ago
- A collection of tools to read/write NFC ST SRI512 and SRIX4K tags.☆16Feb 6, 2021Updated 5 years ago
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆35Aug 31, 2020Updated 5 years ago
- 31 Tips for pentesters & security engineers☆86Aug 20, 2021Updated 4 years ago
- Kubernetes Security Posture Management☆15Nov 5, 2024Updated last year
- PMKID Attack Module for the WiFi Pineapple☆17Jul 14, 2023Updated 2 years ago
- Social Lab is NOT a real social network. It is a social engineering wargame.☆25Jan 6, 2014Updated 12 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- Matrix Rooms Search - a standalone search engine and Matrix directory server☆33Updated this week
- A simple script to obfuscate batch(bat) code easily☆25Oct 21, 2023Updated 2 years ago
- Javascript keylogger with web panel☆20Dec 12, 2023Updated 2 years ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆40Dec 28, 2024Updated last year
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 11 months ago
- code for paper TDGIA:Effective Injection Attacks on Graph Neural Networks (KDD 2021, research track)☆22Nov 5, 2021Updated 4 years ago