Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layers verification.
☆46Jul 13, 2018Updated 7 years ago
Alternatives and similar repositories for dot2moon
Users that are interested in dot2moon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆271Mar 24, 2021Updated 5 years ago
- Search for Directory Traversal Vulnerabilities☆461Jan 11, 2026Updated 2 months ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆265Nov 18, 2021Updated 4 years ago
- Analyze Android APK files from a browser.☆15Sep 29, 2020Updated 5 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- Tool for simple work with url, params, hash☆10Jul 11, 2019Updated 6 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Automation: Bash script wrapper to find and verify time base sql injection☆10Aug 25, 2022Updated 3 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- ☆13Sep 8, 2024Updated last year
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 9 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Repo of useful scripts☆104Jun 30, 2020Updated 5 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- Monitor the textual data pasted into Windows clipboard☆29Nov 4, 2018Updated 7 years ago
- Presentation presented at DEFCON 27 PHV☆27Aug 14, 2019Updated 6 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Bash script to automate Bug Bounty Reconnaissance☆45Jan 3, 2021Updated 5 years ago
- Tools to gather subdomains from Bug Bounty programs☆65Mar 29, 2018Updated 7 years ago
- Twingly URL tools☆13Nov 25, 2025Updated 4 months ago
- A URL shortening and expanding cli tool.☆11Aug 31, 2020Updated 5 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆110Oct 28, 2025Updated 4 months ago
- Tools to build and modify URLs.☆23Sep 13, 2023Updated 2 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Aug 27, 2019Updated 6 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Jul 10, 2018Updated 7 years ago
- Backdoor for Windows systems (client and server) writen in C (client) and ASM (server) using reverse connection☆19Jul 6, 2014Updated 11 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Hunting Bugs for Fun and Profit☆276Jul 29, 2020Updated 5 years ago
- ActiveMime File Format Documentation☆19Jun 28, 2021Updated 4 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- 💾 Bash oneliners and terminal tricks☆22Nov 24, 2022Updated 3 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆565Aug 17, 2020Updated 5 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Jan 25, 2026Updated 2 months ago