☆44May 4, 2025Updated last year
Alternatives and similar repositories for RFC822-Email-Validator
Users that are interested in RFC822-Email-Validator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆25Mar 15, 2026Updated 2 months ago
- TLDFinder is a Python package that identifies valid top-level domains (TLDs) for a list of domains with wildcard characters in the TLD.☆24Jul 2, 2023Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated 2 years ago
- ☆516Aug 21, 2025Updated 9 months ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆31Sep 9, 2025Updated 8 months ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆43May 15, 2026Updated last week
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆20Feb 20, 2026Updated 3 months ago
- Javascript sourcemaps enumeration tool☆16Dec 19, 2024Updated last year
- A tool to find domains that are in the same Microsoft tenant☆24Mar 18, 2025Updated last year
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 6 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 8 months ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 4 months ago
- Url scrapper or extractor from alienvault☆39Mar 1, 2025Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- ☆13Apr 6, 2022Updated 4 years ago
- Master Kali Linux, Excel in Offensive Security☆35Jun 15, 2025Updated 11 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆50Apr 7, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆12Dec 7, 2022Updated 3 years ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Mar 24, 2026Updated last month
- ☆72May 5, 2025Updated last year
- Exploits Unauth Docker API☆45Apr 18, 2025Updated last year
- Steganography Detection Framework☆14Jan 8, 2025Updated last year
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆85Apr 12, 2025Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆45Feb 24, 2025Updated last year
- ☆15Mar 21, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆16Jun 4, 2025Updated 11 months ago
- ☆13May 20, 2022Updated 4 years ago
- Burp plugin for the 1Password session protocol for use by security researchers.☆79Jun 3, 2025Updated 11 months ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,572Dec 7, 2025Updated 5 months ago
- Collection of cybersecurity and ethical hacking roadmaps from beginner to advanced, curated by CYBER MIND SPACE.☆56Jun 20, 2025Updated 11 months ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- 📕 哔哩哔哩大学,收集哔哩哔哩的学习资源☆12Oct 15, 2023Updated 2 years ago