cycurity / wister
A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.
☆81Updated last year
Related projects: ⓘ
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆86Updated last month
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆145Updated 8 months ago
- ☆110Updated 7 months ago
- Collect XSS vulnerable parameters from entire domain.☆144Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆101Updated 3 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆118Updated last week
- SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web a…☆64Updated last week
- Simple HTTP listener for security testing☆112Updated 11 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆141Updated last month
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆122Updated 2 months ago
- 📲 Enumerate information from an app based on the APK file☆107Updated last month
- Wordlists handcrafted (and automated) with ♥☆189Updated 5 months ago
- Here Are Some Bug Bounty Resource From Twitter☆82Updated 4 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆145Updated this week
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆124Updated 2 months ago
- Automate Scoping, OSINT and Recon assessments.☆89Updated 2 weeks ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆78Updated 8 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆140Updated 4 months ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆87Updated last month
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆135Updated last month
- ☆70Updated 2 months ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆47Updated 3 years ago
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆81Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆53Updated 6 months ago
- Private Nuclei Templates☆88Updated last year
- CVE Collection of jQuery UI XSS Payloads☆110Updated last year
- ☆75Updated 3 years ago
- Automated Subdomain Enumeration and Scanning Tool☆107Updated 11 months ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆131Updated 6 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year