Viralmaniar / MurMurHashLinks
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
☆119Updated 2 years ago
Alternatives and similar repositories for MurMurHash
Users that are interested in MurMurHash are comparing it to the libraries listed below
Sorting:
- pFuzz helps us to bypass web application firewall by using different methods at the same time.☆162Updated 4 years ago
- A burp suite extension that enumerates infrastructure and application admin interfaces (OTG-CONFIG-005)☆122Updated 3 years ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆64Updated last year
- A more useful CSRF PoC generator on Burp Suite☆87Updated 3 years ago
- D3Ext's Forward Shell☆120Updated 2 years ago
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆163Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆75Updated last year
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Spring4Shell Burp Scanner☆72Updated 3 years ago
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆80Updated 2 years ago
- nuclei scanner for proxyshell ( CVE-2021-34473 )☆47Updated 3 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆98Updated 2 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- Burp Suite's extension to scan and crawl Single Page Applications☆106Updated 2 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Updated 4 years ago
- Apache Spark Shell Command Injection Vulnerability☆88Updated 3 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆61Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Updated last week
- Run all your bug bounty VPN profiles in parallel and expose them via multiple local SOCKS proxies.☆112Updated 4 years ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated 2 years ago
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25Updated 3 years ago
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆56Updated 2 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆65Updated 3 years ago
- Exploits targeting vBulletin.☆75Updated 2 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 3 years ago
- A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.☆115Updated 10 months ago
- Striping CDN & WAF IPs from a list of IP Addresses☆80Updated 7 months ago
- ☆104Updated 2 years ago