☆42Mar 15, 2026Updated last week
Alternatives and similar repositories for lorito
Users that are interested in lorito are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Useful scripts for tampermonkey that I used during bug hunting. Will be updated "au fil de l'eau"☆17Jun 2, 2025Updated 9 months ago
- PoC for leaking text nodes via CSS injection☆25Jul 27, 2024Updated last year
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- collectvars collects JavaScript variables, highlights risky ones, and helps you understand code structure, while you casually browse.☆33Aug 28, 2024Updated last year
- An Automated Framework for End-to-End Blind XSS Detection and Reporting☆16Jan 23, 2026Updated 2 months ago
- web cache deception detect☆40Jan 9, 2026Updated 2 months ago
- HTTP testing platform for security researchers☆21Updated this week
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 10 months ago
- API for Asset Service☆15Aug 15, 2024Updated last year
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Combined and sorted cybersecurity collection of all high quality seclists and wordlists from the internet☆23May 1, 2025Updated 10 months ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- A tool to slice URLs into directory levels☆19Jan 16, 2026Updated 2 months ago
- A tool for inspecting and analyzing mobile application storage files.☆51May 15, 2025Updated 10 months ago
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- Blank methodology sheet for the OSWE exam☆13Dec 17, 2021Updated 4 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆154Mar 31, 2025Updated 11 months ago
- FTP-AnonHunter is a Python tool designed to automate the discovery of anonymous open FTP servers. Using Nmap’s ftp-anon script, the tool …☆10Oct 16, 2024Updated last year
- WebSocket REPL for pentesters☆234Jul 24, 2024Updated last year
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆12Oct 27, 2024Updated last year
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆92Mar 25, 2024Updated 2 years ago
- Generate a cross join, also known as a Cartesian product, from the lines of the specified files. This process is useful for creating fuzz…☆21Jun 29, 2023Updated 2 years ago
- ☆17Aug 29, 2022Updated 3 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- A simple Go module to retrieve host information through NTLMSSP challenges over HTTP(S) NTLM Authentication/RDP NLA/SMTP NTLM Authenticat…☆19Feb 20, 2026Updated last month
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆62Sep 4, 2024Updated last year
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- Salesforce object access auditor☆118Jan 30, 2023Updated 3 years ago
- ☆128Dec 6, 2023Updated 2 years ago
- Detect SSRF within Caido☆49Feb 20, 2026Updated last month
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- ☆91Dec 15, 2025Updated 3 months ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- CVE-2024-0044☆12Aug 24, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 7 months ago
- Subbdom API Client☆13Feb 7, 2025Updated last year