glitchedgitz / cook-ingredientsView external linksLinks
The largest collection of wordlists in yaml for bug bounty tools
☆37Apr 7, 2024Updated last year
Alternatives and similar repositories for cook-ingredients
Users that are interested in cook-ingredients are comparing it to the libraries listed below
Sorting:
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,320Dec 22, 2025Updated last month
- ☆11Dec 5, 2020Updated 5 years ago
- Random HTTP User-Agent string generator☆11Oct 22, 2014Updated 11 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Feb 1, 2026Updated 2 weeks ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Dec 29, 2020Updated 5 years ago
- Go package for resolving IP addresses back to published cloud provider public ranges☆28May 8, 2018Updated 7 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆48Dec 24, 2020Updated 5 years ago
- WaybackRust is a tool written in Rust to query the WaybackMachine.☆13Jul 18, 2025Updated 6 months ago
- ☆10Jan 30, 2022Updated 4 years ago
- Tools about security.txt for Ruby☆20Oct 14, 2023Updated 2 years ago
- Python implementation of netstat features☆14Jul 24, 2018Updated 7 years ago
- WILSON Cloud Respwnder is a Web Interaction Logger Sending Out Notifications with the ability to serve custom content in order to appropr…☆50Sep 5, 2024Updated last year
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- ☆16Nov 15, 2022Updated 3 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 4 months ago
- Convert an IP into Alternative / Obfuscated versions of itself☆14Aug 13, 2022Updated 3 years ago
- Simple Root Checker to check if your device is rooted☆19Dec 15, 2025Updated last month
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Feb 6, 2022Updated 4 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Jul 30, 2022Updated 3 years ago
- Tool for CVE-2022-1388☆14May 13, 2022Updated 3 years ago
- Golang CLI binary used for installing and managing Ghostwriter☆19Feb 6, 2026Updated last week
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- 就是一个练习Java反序列化的最简单环境☆14Dec 24, 2021Updated 4 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆41Jul 8, 2020Updated 5 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Jun 23, 2024Updated last year
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 5 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- Collection of templates (nuclei/jaeles..)☆16Jun 9, 2021Updated 4 years ago
- ☆18Dec 8, 2022Updated 3 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated last month
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- ☆42Jul 14, 2021Updated 4 years ago