Creates date-based wordlists that can be used for penetration testing, QA fixtures, or any workflow that needs exhaustive date coverage.
☆16Oct 29, 2025Updated 4 months ago
Alternatives and similar repositories for Chronogen
Users that are interested in Chronogen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆19Nov 29, 2024Updated last year
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- Here we are gather all Nuclei Templates that are Publically available.☆15Apr 28, 2024Updated last year
- Collection of tools that might help Persian translators.☆11Dec 31, 2023Updated 2 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Oct 31, 2022Updated 3 years ago
- Java + Native 全自动 SSL Pinning 绕过脚本(Universal SSL Pinning Bypass Script (Java & Native Combined))☆46Jul 1, 2025Updated 8 months ago
- List of OSINT Capture The Flag platforms☆40Mar 6, 2026Updated 2 weeks ago
- Reconnaissance & Footprinting framework for BugHunters & RedTeamers☆21Aug 15, 2025Updated 7 months ago
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆21Dec 22, 2022Updated 3 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆30Jul 30, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Extract the best title value from within HTML head elements.☆17Apr 17, 2023Updated 2 years ago
- A Web Application Penetration Testing Framework build in React with an Node/Express/MongoDB back-end☆25Mar 7, 2023Updated 3 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Insecure Firebase | Bugbounty | Hacking Insecure Firbase☆91Sep 2, 2021Updated 4 years ago
- Pwny Cup 2K24 quals challenges writeups☆14Nov 9, 2024Updated last year
- LFI Payloads List coolected from github repos☆88May 9, 2020Updated 5 years ago
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆35Aug 31, 2020Updated 5 years ago
- 31 Tips for pentesters & security engineers☆86Aug 20, 2021Updated 4 years ago
- PMKID Attack Module for the WiFi Pineapple☆17Jul 14, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆26Oct 21, 2023Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 10 months ago
- code for paper TDGIA:Effective Injection Attacks on Graph Neural Networks (KDD 2021, research track)☆22Nov 5, 2021Updated 4 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- A passive way to find backups/ sensitive information.☆89Jul 10, 2025Updated 8 months ago
- Get a reverse shell using PostgreSQL☆21Aug 16, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆23Jan 23, 2023Updated 3 years ago
- ☆26Jun 5, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python script that converts Grafana hash digests to PBKDF2_HMAC_SHA256 format in order to facilitate password cracking using Hashcat.☆26Oct 24, 2021Updated 4 years ago
- Paramix is a command-line tool for modifying the parameters of a list of URLs from stdin and returns them in stdout.☆17Aug 23, 2024Updated last year
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆24Dec 13, 2019Updated 6 years ago
- All about subdomain enumeration☆16Feb 5, 2019Updated 7 years ago
- Make DOS attacks android and other bluetooth devices☆18Feb 7, 2016Updated 10 years ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆100Sep 9, 2024Updated last year
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago