carlospolop / LeakosLinks
☆74Updated last year
Alternatives and similar repositories for Leakos
Users that are interested in Leakos are comparing it to the libraries listed below
Sorting:
- ☆56Updated 2 years ago
- ☆68Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆65Updated 3 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- My personal collection of nuclei templates made for fuzzing.☆27Updated 10 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆57Updated 3 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- ☆43Updated 2 months ago
- ☆76Updated last year
- Web Hacking and Red Teaming MindMap☆74Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- DNS resolution tracing tool☆34Updated 4 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆52Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆77Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆77Updated last year
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆75Updated last year
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆36Updated 10 months ago
- HTTP verb tampering & methods enumeration☆61Updated 3 years ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last week
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- Apache Tomcat exploit and Pentesting guide for penetration tester☆60Updated 2 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆39Updated 2 months ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated last year
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆84Updated 2 years ago