glitchedgitz / cook-ingredients
The largest collection of wordlists in yaml for bug bounty tools
☆34Updated 11 months ago
Alternatives and similar repositories for cook-ingredients:
Users that are interested in cook-ingredients are comparing it to the libraries listed below
- Validate proxies for specific domain☆35Updated 3 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- My fuzz repo!☆22Updated last year
- XSS scanning with Dalfox on Github-action☆23Updated last year
- A simple tool which makes creating nuclei templates even easier.☆36Updated 9 months ago
- Related subdomains finder☆29Updated 2 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Updated 3 years ago
- Ffuf output browser☆39Updated 2 years ago
- Tool to extract & validate google fcm server keys from apks☆28Updated 4 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆16Updated 2 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆14Updated 2 years ago
- ☆52Updated 4 months ago
- parse ffuf & map endpoints to wordlists☆20Updated 4 years ago
- A BurpSuite plugin for BBRF☆24Updated 4 months ago
- List of fresh and validated DNS resolvers updated every 12h.☆22Updated this week
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- ☆29Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆22Updated last year
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Python script to launch burp scans automatically☆32Updated 3 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- ☆30Updated 11 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆33Updated last month
- ElasticSearch exploit and Pentesting guide for penetration tester☆26Updated 2 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆35Updated 10 months ago
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆24Updated 10 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- ☆35Updated 2 months ago