Tuhinshubhra / Path-FinderLinks
Visualizing Path Finding using A* algorithm
☆13Updated 3 years ago
Alternatives and similar repositories for Path-Finder
Users that are interested in Path-Finder are comparing it to the libraries listed below
Sorting:
- Automated Recon Framework☆24Updated 5 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Updated 2 years ago
- XSS scanning with Dalfox on Github-action☆26Updated 2 years ago
- Web Recon & Exploitation Tool.☆55Updated 5 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆49Updated last year
- Pentest stuff☆49Updated 2 years ago
- ☆49Updated 5 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆63Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- Workflow for pentesting web applications.☆21Updated 6 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- Tools for bug hunting in a container☆22Updated 2 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Security test tool for Blind XSS☆26Updated 5 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆67Updated 6 years ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Updated 3 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- A tool to check for response status codes with ease☆14Updated 2 years ago
- Web application recon for bug bounty☆20Updated 5 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆31Updated 4 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- Journey to Try Harder !!!☆32Updated 6 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 4 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago
- Simple command shell collections☆35Updated 4 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 3 months ago
- 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment☆33Updated 4 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago