h6nt3r / toolsLinks
☆27Updated this week
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆42Updated 2 months ago
- ☆73Updated last month
- ☆9Updated 7 months ago
- ☆58Updated 6 months ago
- JScripter is a Python script designed to scrape and save unique JavaScript files from a list of URLs or a single URL.☆26Updated 6 months ago
- A passive way to find backups/ sensitive information.☆80Updated last week
- Grep subdomains from web pages.☆42Updated 3 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆36Updated 10 months ago
- ☆18Updated 2 months ago
- A powerful bash script for massive XSS scanning leveraging Brute Logic's KNOXSS API☆71Updated 4 months ago
- Bypass Reset Password Code Lead to Account Takeover☆25Updated 8 months ago
- My custom created nuclei for SQLi, bugbounty, pentesting☆25Updated 3 weeks ago
- ☆119Updated last year
- A Powerful Recon Engine☆63Updated 6 months ago
- ☆48Updated last year
- ☆92Updated last month
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆61Updated 6 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆60Updated 3 months ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆31Updated last year
- A Python tool to resolve domains to IPs, fetch related CVEs, and display open ports☆15Updated 5 months ago
- ParamScan is a chrome extension for finding reflected parameters in a webpage.☆82Updated 4 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆54Updated 4 months ago
- shef - extract/scrape IPs from shodan without any API key☆51Updated 4 months ago
- Tools for bug bounty☆27Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆64Updated last year
- Url scrapper or extractor from alienvault☆33Updated 3 months ago
- YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitra…☆12Updated last month
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆31Updated last year
- Private Nuclei Templates☆99Updated 3 months ago