Just lists of lists of lists !
☆17Oct 13, 2025Updated 6 months ago
Alternatives and similar repositories for Enums
Users that are interested in Enums are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Computer Science (data structures, algorithms), challenges solutions from LeetCode, Advent Of Code, Project Euler etc.☆12Oct 25, 2025Updated 6 months ago
- All the information provided on this site is for educational purposes only.☆18Feb 27, 2024Updated 2 years ago
- Hacking tools☆148Feb 11, 2025Updated last year
- A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title☆12Oct 16, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆11Aug 4, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 9 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆25Mar 1, 2019Updated 7 years ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Jul 10, 2020Updated 5 years ago
- Hacking files and scripts☆12Mar 21, 2018Updated 8 years ago
- Subdomains-enumeration, subdomain-takeover monitoring api and S3 bucket scanner.☆40Nov 21, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- Find secret keys from JS file☆52Jun 4, 2023Updated 2 years ago
- In memory fuzzing for embedded devices☆19Jun 20, 2012Updated 13 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Contains nuclei templates for security testing and POCs.☆17Oct 19, 2024Updated last year
- A Python listener to capture Snort event via the UNIX Socket output.☆15Mar 30, 2017Updated 9 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆57Oct 29, 2020Updated 5 years ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆288Jul 13, 2024Updated last year
- DirBuster for Node.js☆20Mar 21, 2019Updated 7 years ago
- A tool that can take a URL or list of URL and prints back SAML consume URL.☆35Feb 4, 2019Updated 7 years ago
- Process URLs and remove duplicate query parameters.☆27Mar 19, 2024Updated 2 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Apr 17, 2020Updated 6 years ago
- Some useful test data or payloads☆26Oct 30, 2021Updated 4 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Top disclosed reports from HackerOne☆10Jun 9, 2020Updated 5 years ago
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆99Dec 30, 2019Updated 6 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Python 3 Reverse Shell☆26Jan 2, 2022Updated 4 years ago
- This repository contains proof of concept for zero days and CVEs that were found by Omar Hashem through Security Research☆45Dec 31, 2022Updated 3 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago