Files and Folders list used in file enumeration during Bug Bounty
☆12Oct 16, 2020Updated 5 years ago
Alternatives and similar repositories for master_discovery
Users that are interested in master_discovery are comparing it to the libraries listed below
Sorting:
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- This is very basic automated recon script tool.☆18Jul 14, 2024Updated last year
- ☆20Aug 15, 2020Updated 5 years ago
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- Use this Python Bot that Automates like4like.org to Gain Free Credit.☆16Apr 4, 2023Updated 2 years ago
- A collection of scripts used to interact with the Burp Rest API☆56Feb 11, 2019Updated 7 years ago
- ☆23Mar 29, 2022Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Aug 28, 2020Updated 5 years ago
- Automation for Open Threat Exchange☆24Mar 16, 2024Updated last year
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- ☆10Apr 20, 2022Updated 3 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Aug 18, 2020Updated 5 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆35Jan 8, 2021Updated 5 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Python Duo Push API☆41May 31, 2025Updated 9 months ago
- A basic golang server/client for distributing tasks over multiple systems.☆39Jul 20, 2020Updated 5 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- use at your own risk☆37Nov 23, 2019Updated 6 years ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m …☆75Mar 22, 2024Updated last year
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- A Repository created solely for Sathyabama University Students to develop Open-Source Temper where they can add code in any language they…☆13Mar 14, 2020Updated 5 years ago
- This is a simple MD5 Hash Cracker tool to decrypt it. The usage is :☆11Dec 29, 2018Updated 7 years ago
- neoshamans recon tool(s)☆11May 13, 2022Updated 3 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- ☆11May 17, 2023Updated 2 years ago
- Powershell script to easily create new users in AD and send email confirmations☆12Nov 23, 2020Updated 5 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 2 months ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆43Jul 13, 2023Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Jan 1, 2024Updated 2 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago