SkyPenguinLabs / SkyLineLinks
A cyber security oriented interpreted programming language designed to make your experience with cyber security (offensive and defensive) better in every way
☆18Updated last year
Alternatives and similar repositories for SkyLine
Users that are interested in SkyLine are comparing it to the libraries listed below
Sorting:
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated last year
- My journey and notes on learning Offensive Security from the ground up☆19Updated 2 weeks ago
- Manage attack surface data on Elasticsearch☆23Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Updated last year
- bash script for automating subdomain enumeration process either passive or active☆28Updated 9 months ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- Find subdomains by searching public certificate records☆16Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- Template Nuclei SSTI☆33Updated 2 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 9 months ago
- List of custom Nuclei templates☆15Updated last year
- Tool for scanning domains for .git directories.☆16Updated last year
- MacroExploit use in excel sheet☆20Updated 2 years ago
- ☆19Updated 2 years ago
- this nuclei template finds back up files☆21Updated last month
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Updated 2 years ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆28Updated last year
- Cobalt Strike BOFS☆16Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- Subtron is a professional-grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Updated 3 weeks ago
- ☆13Updated last year
- my own 2fa bypass methodolgy☆24Updated 2 years ago