☆40May 4, 2025Updated 11 months ago
Alternatives and similar repositories for RFC822-Email-Validator
Users that are interested in RFC822-Email-Validator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Apr 17, 2025Updated 11 months ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆24Mar 15, 2026Updated 3 weeks ago
- TLDFinder is a Python package that identifies valid top-level domains (TLDs) for a list of domains with wildcard characters in the TLD.☆24Jul 2, 2023Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- ☆506Aug 21, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- ☆31Sep 9, 2025Updated 7 months ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆42Mar 16, 2026Updated 3 weeks ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last month
- ☆63May 5, 2025Updated 11 months ago
- Javascript sourcemaps enumeration tool☆15Dec 19, 2024Updated last year
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated 11 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 7 months ago
- A fast, minimalistic scanner for time-based SQL injection (SQLi) detection – built in Go.☆144May 7, 2025Updated 11 months ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 3 months ago
- A guide on how to embed a tracking image into an email for investigation purposes☆19Feb 23, 2020Updated 6 years ago
- Url scrapper or extractor from alienvault☆39Mar 1, 2025Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Apr 6, 2022Updated 4 years ago
- Master Kali Linux, Excel in Offensive Security☆33Jun 15, 2025Updated 9 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆48Apr 7, 2025Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆147Jan 12, 2025Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Mar 24, 2026Updated 2 weeks ago
- Steganography Detection Framework☆14Jan 8, 2025Updated last year
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆85Apr 12, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Mar 21, 2025Updated last year
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆15Jun 4, 2025Updated 10 months ago
- ☆13May 20, 2022Updated 3 years ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,550Dec 7, 2025Updated 4 months ago
- Burp plugin for the 1Password session protocol for use by security researchers.☆79Jun 3, 2025Updated 10 months ago
- Collection of cybersecurity and ethical hacking roadmaps from beginner to advanced, curated by CYBER MIND SPACE.☆47Jun 20, 2025Updated 9 months ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year