Sub-domains enumeration framework
☆27Nov 26, 2017Updated 8 years ago
Alternatives and similar repositories for substack
Users that are interested in substack are comparing it to the libraries listed below
Sorting:
- ☆11Dec 25, 2020Updated 5 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- OWASP Findings Format☆19Mar 4, 2021Updated 4 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Become a Github Rockstar in less than 10 seconds☆19Mar 18, 2023Updated 2 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- Related subdomains finder☆28May 18, 2022Updated 3 years ago
- A .git/ folder disclosure exploit☆22Jul 14, 2019Updated 6 years ago
- Scans packages in npm and pypi for secrets☆31Nov 4, 2019Updated 6 years ago
- Tool to extract & validate google fcm server keys from apks☆29Jan 20, 2021Updated 5 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- Eugenics solution☆13May 30, 2018Updated 7 years ago
- Blend Web App Framework☆10Updated this week
- Learning Penetration Testing of Android Applications☆80Aug 5, 2017Updated 8 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Android currency detection☆14Jan 31, 2026Updated last month
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- SkyRAT - Powershell Remote Administration Tool☆33Jan 8, 2018Updated 8 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Jan 7, 2020Updated 6 years ago
- My super-quick-to-setup Termux environment.☆36Mar 7, 2023Updated 2 years ago
- AWS S3 Sensitive Data Search☆35Jan 16, 2022Updated 4 years ago
- Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.☆151Jun 29, 2020Updated 5 years ago
- ℹ️ Information à propos de l'organisation HACF-fr | Information about HACF-fr organization.☆11Apr 27, 2025Updated 10 months ago
- Created to reprodce Error whn using Puppeteer on gitpod☆10Sep 3, 2020Updated 5 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- DAFTAR AKUN BARU GOJEK + AUTO KLAIM VOUCHER GOFOOD TERBARU☆18Apr 11, 2020Updated 5 years ago
- A rough implementation of the algorithm proposed by Wang (Shazam inc.) in Java☆12Sep 27, 2012Updated 13 years ago