A simple automation tool to detect lfi, rce and ssti vulnerability
☆56Feb 15, 2022Updated 4 years ago
Alternatives and similar repositories for lazyParam
Users that are interested in lazyParam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- ☆35Aug 2, 2022Updated 3 years ago
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 3 years ago
- I collected it to help the bug hunter get a reward☆57Sep 7, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- ☆38Dec 10, 2023Updated 2 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Dec 27, 2022Updated 3 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- ☆65Jan 14, 2023Updated 3 years ago
- ☆15Apr 13, 2021Updated 5 years ago
- xss-payload-list☆136Jul 25, 2024Updated last year
- Some Cheat Sheet for Red Team☆17Dec 30, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- i will upload more templates here to share with the comunity.☆569Apr 17, 2024Updated 2 years ago
- ☆95Nov 4, 2025Updated 6 months ago
- A Python based scanner uses shodan-internetdb to scan the IP.☆32Mar 6, 2022Updated 4 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 3 months ago
- ☆17Mar 11, 2024Updated 2 years ago
- Just simple log4j scanner☆12Dec 13, 2021Updated 4 years ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A reverse shell in PHP using Unicode encoding as variable assignment☆19Mar 8, 2021Updated 5 years ago
- ☆32Dec 30, 2022Updated 3 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆20Mar 13, 2023Updated 3 years ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆41Feb 4, 2023Updated 3 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Find sensitive information using dorks from different search-engines.☆93Oct 24, 2024Updated last year
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple Google Dorks search tool☆330Sep 3, 2025Updated 8 months ago
- A standalone Blind XSS Script.☆48Aug 15, 2025Updated 8 months ago
- This is go CLI tool for send fast Multiple get HTTP request.☆286Jan 20, 2023Updated 3 years ago
- Smart context-based SSRF vulnerability scanner.☆361May 5, 2022Updated 4 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 3 years ago
- Recon-Ninja☆86Mar 24, 2024Updated 2 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago