cspshivam / sweetuuView external linksLinks
Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead of any other php code.
☆10Dec 16, 2024Updated last year
Alternatives and similar repositories for sweetuu
Users that are interested in sweetuu are comparing it to the libraries listed below
Sorting:
- struts2漏洞检测工具+全环境☆12Feb 1, 2023Updated 3 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- ☆12Jun 15, 2022Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- Bug Bounty Program Discovery tool, that discovers bug Bounty Program via security.txt file by default and you can use custom dork☆16Jul 17, 2022Updated 3 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- ☆19Jan 24, 2023Updated 3 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- Ragno is a Passive URL Crawler | Written in Python3 | Fetches URLs from the Wayback Machine, AlienVault's Open Threat Exchange & Common C…☆22Sep 1, 2025Updated 5 months ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆56Jan 10, 2022Updated 4 years ago
- Magic Header Blind Xss tool (deliver blind xss payloads in request headers).☆26May 30, 2021Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Paid Udemy Courses with Coupons☆28Mar 24, 2022Updated 3 years ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Nov 13, 2021Updated 4 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Sep 14, 2023Updated 2 years ago
- ☆35Aug 15, 2020Updated 5 years ago
- Scape firmware metadata from 18 vendors and download corresponding firmware images. Save in MySQL database for InfoSec research purposes.☆12Feb 17, 2023Updated 2 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated last month
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 3 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- Gathers urls from common crawl☆35Nov 9, 2019Updated 6 years ago
- ☆34Jun 23, 2021Updated 4 years ago
- ☆35Mar 14, 2022Updated 3 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆32Dec 30, 2022Updated 3 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- ☆10Jun 13, 2024Updated last year
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 3 months ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Dec 31, 2020Updated 5 years ago
- ☆13Feb 26, 2021Updated 4 years ago
- ☆11Dec 5, 2020Updated 5 years ago