Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration
☆309Mar 4, 2026Updated this week
Alternatives and similar repositories for hijagger
Users that are interested in hijagger are comparing it to the libraries listed below
Sorting:
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆852Feb 13, 2023Updated 3 years ago
- Nuclei plugins to audit Chrome extensions☆65Jul 16, 2024Updated last year
- Run all your bug bounty VPN profiles in parallel and expose them via multiple local SOCKS proxies.☆113Nov 14, 2021Updated 4 years ago
- Prototype pollution scanner using headless chrome☆218Jul 27, 2022Updated 3 years ago
- tool for generating wordlists or extending an existing one using mutations.☆392Feb 1, 2026Updated last month
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Dependency Combobulator☆95Jan 10, 2024Updated 2 years ago
- ☆27May 6, 2024Updated last year
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Updated this week
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆710Oct 9, 2023Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,299Updated this week
- OSINT tools and more but without API key☆1,484Feb 15, 2026Updated 2 weeks ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,006Updated this week
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆187Oct 30, 2021Updated 4 years ago
- ☆227Dec 18, 2025Updated 2 months ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆334Sep 9, 2024Updated last year
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- Unleash the power of cloud☆815Nov 19, 2024Updated last year
- Fast and configurable TLS grabber focused on TLS based data collection.☆1,074Feb 25, 2026Updated last week
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆967Jan 10, 2025Updated last year
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆93Nov 21, 2021Updated 4 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆181Dec 22, 2025Updated 2 months ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆27Jun 18, 2025Updated 8 months ago
- ☆17May 16, 2022Updated 3 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- ServiceNow widge-simple-list misconfiguration scanner☆65Nov 16, 2023Updated 2 years ago
- ☆10Dec 4, 2020Updated 5 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆485Sep 24, 2025Updated 5 months ago
- Rust-based high performance domain permutation generator.☆299Dec 2, 2023Updated 2 years ago
- ☆154Aug 18, 2023Updated 2 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆279Feb 11, 2021Updated 5 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆18Mar 13, 2023Updated 2 years ago
- AIx is a cli tool to interact with Large Language Models (LLM) APIs.☆312Feb 23, 2026Updated last week
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,827Feb 25, 2026Updated last week
- a javascript change monitoring tool for bugbounties☆712Jul 31, 2024Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago