Creates date-based wordlists that can be used for penetration testing, QA fixtures, or any workflow that needs exhaustive date coverage.
☆16Mar 25, 2026Updated 3 weeks ago
Alternatives and similar repositories for Chronogen
Users that are interested in Chronogen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆19Nov 29, 2024Updated last year
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- Here we are gather all Nuclei Templates that are Publically available.☆15Apr 28, 2024Updated last year
- Collection of tools that might help Persian translators.☆11Dec 31, 2023Updated 2 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆25Aug 21, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆12Oct 31, 2022Updated 3 years ago
- BLEMystique is an ESP32 based custom BLE target☆14Dec 30, 2018Updated 7 years ago
- A redesigned ErgoDox keyboard☆12Sep 1, 2020Updated 5 years ago
- Reconnaissance & Footprinting framework for BugHunters & RedTeamers☆21Aug 15, 2025Updated 8 months ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆21Dec 22, 2022Updated 3 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- A Python script to find tenant id an region from a list of domain names.☆19Jan 31, 2025Updated last year
- List of OSINT Capture The Flag platforms☆54Mar 27, 2026Updated 2 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆30Jul 30, 2024Updated last year
- Extract the best title value from within HTML head elements.☆17Apr 17, 2023Updated 2 years ago
- A Web Application Penetration Testing Framework build in React with an Node/Express/MongoDB back-end☆25Mar 7, 2023Updated 3 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Insecure Firebase | Bugbounty | Hacking Insecure Firbase☆91Sep 2, 2021Updated 4 years ago
- LFI Payloads List coolected from github repos☆88May 9, 2020Updated 5 years ago
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆35Aug 31, 2020Updated 5 years ago
- 31 Tips for pentesters & security engineers☆87Aug 20, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PMKID Attack Module for the WiFi Pineapple☆17Jul 14, 2023Updated 2 years ago
- Kubernetes Security Posture Management☆15Nov 5, 2024Updated last year
- Social Lab is NOT a real social network. It is a social engineering wargame.☆25Jan 6, 2014Updated 12 years ago
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆26Oct 21, 2023Updated 2 years ago
- Javascript keylogger with web panel☆20Dec 12, 2023Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 11 months ago
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆25Oct 1, 2023Updated 2 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- Arduino sketch for the Open Grade Simulator - an open hardware and software incline simulator for indoor cycle training☆18May 19, 2021Updated 4 years ago
- A passive way to find backups/ sensitive information.☆89Jul 10, 2025Updated 9 months ago
- Get a reverse shell using PostgreSQL☆21Aug 16, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆23Jan 23, 2023Updated 3 years ago
- Python script that converts Grafana hash digests to PBKDF2_HMAC_SHA256 format in order to facilitate password cracking using Hashcat.☆26Oct 24, 2021Updated 4 years ago
- Paramix is a command-line tool for modifying the parameters of a list of URLs from stdin and returns them in stdout.☆17Aug 23, 2024Updated last year