☆44May 4, 2025Updated 11 months ago
Alternatives and similar repositories for RFC822-Email-Validator
Users that are interested in RFC822-Email-Validator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Apr 17, 2025Updated last year
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆25Mar 15, 2026Updated last month
- TLDFinder is a Python package that identifies valid top-level domains (TLDs) for a list of domains with wildcard characters in the TLD.☆24Jul 2, 2023Updated 2 years ago
- ☆511Aug 21, 2025Updated 8 months ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆31Sep 9, 2025Updated 7 months ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆42Mar 16, 2026Updated last month
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆19Feb 20, 2026Updated 2 months ago
- Javascript sourcemaps enumeration tool☆16Dec 19, 2024Updated last year
- A tool to find domains that are in the same Microsoft tenant☆24Mar 18, 2025Updated last year
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 5 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated 11 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 8 months ago
- A fast, minimalistic scanner for time-based SQL injection (SQLi) detection – built in Go.☆144May 7, 2025Updated 11 months ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 4 months ago
- A guide on how to embed a tracking image into an email for investigation purposes☆19Feb 23, 2020Updated 6 years ago
- Url scrapper or extractor from alienvault☆39Mar 1, 2025Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- ☆13Apr 6, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Master Kali Linux, Excel in Offensive Security☆34Jun 15, 2025Updated 10 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆49Apr 7, 2025Updated last year
- Exploits Unauth Docker API☆44Apr 18, 2025Updated last year
- Steganography Detection Framework☆14Jan 8, 2025Updated last year
- ☆72May 5, 2025Updated 11 months ago
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆85Apr 12, 2025Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- ☆15Mar 21, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆16Jun 4, 2025Updated 10 months ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,560Dec 7, 2025Updated 4 months ago
- Collection of cybersecurity and ethical hacking roadmaps from beginner to advanced, curated by CYBER MIND SPACE.☆55Jun 20, 2025Updated 10 months ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- 🚀 XSSFUZZ - A tool for detecting XSS vulnerabilities in web applications.☆126Sep 13, 2024Updated last year
- Combined and sorted cybersecurity collection of all high quality seclists and wordlists from the internet☆23May 1, 2025Updated last year
- ☆29Nov 3, 2024Updated last year