gregxsunday / lemmaLinks
Remote CLI tools at your fingertips
☆16Updated 10 months ago
Alternatives and similar repositories for lemma
Users that are interested in lemma are comparing it to the libraries listed below
Sorting:
- output burp body only and auto pretiffy☆15Updated last month
- ☆17Updated last year
- ☆33Updated 2 years ago
- ☆16Updated 4 months ago
- This Burp extension extracts various data (path, parameter keys, parameter values, subdomains, etc.) from the sitemap. This data is used …☆36Updated 3 years ago
- my nuclei templates☆40Updated last year
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆25Updated last year
- My custom created nuclei for SQLi, bugbounty, pentesting☆25Updated 3 weeks ago
- ☆22Updated 2 years ago
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆35Updated 2 years ago
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆29Updated last year
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆40Updated last year
- A Firefox Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆28Updated 5 months ago
- Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles☆17Updated 8 months ago
- convert case style of words☆40Updated last year
- PoC for leaking text nodes via CSS injection☆24Updated 10 months ago
- A simple bash script to gather js files from waybackurls and check for any exposures using nuclei engine.☆1Updated last year
- Testing default web credentials☆33Updated last year
- A simple plugin to export JS files from one or multiple targets☆42Updated last year
- ☆22Updated last year
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆28Updated 3 years ago
- Fetch Javascript sourcemaps, bounty hunter style☆40Updated 2 years ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆48Updated 2 years ago
- JSSCM detects expired domains for Stored XSS exploitation during browsing.☆50Updated 2 months ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆36Updated 8 months ago
- About Recon Tools,Methodology and writeups☆18Updated last year
- ☆64Updated last year
- IIS shortname scanner + bruteforce☆52Updated last year
- Stay on the beat with SubHound - receive notifications for new subdomains on Telegram and Discord! 🐶🎵☆17Updated 2 years ago
- ☆26Updated 11 months ago