List of Mine Private wordlist i use for fuzzing
☆90Feb 25, 2026Updated last month
Alternatives and similar repositories for MINE-Wordlist
Users that are interested in MINE-Wordlist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆49Feb 6, 2026Updated 2 months ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- Advanced JWT decoding & cracking toolkit with a user-friendly UI for security testing☆48Jan 18, 2026Updated 2 months ago
- ☆51Aug 2, 2025Updated 8 months ago
- ☆32Jan 16, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Final and fully functional Car pooling app with database hosted on hostinger.in☆12Dec 7, 2017Updated 8 years ago
- collection of blogs about malware development and analysis☆74Dec 2, 2025Updated 4 months ago
- Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine☆86Mar 23, 2026Updated 2 weeks ago
- React2Shell Ultimate - The most comprehensive CVE-2025-66478 Scanner for Next.js RSC RCE vulnerability. Multi-mode detection, WAF bypass,…☆145Dec 10, 2025Updated 4 months ago
- ☆101Mar 18, 2026Updated 3 weeks ago
- 🔍 SubWatch – Automated Subdomain Monitoring Script☆40Jun 13, 2025Updated 9 months ago
- Grafana scanner with all public CVEs that I collected in one script to make grafana testing easier☆75Feb 15, 2026Updated last month
- ☆31Sep 9, 2025Updated 7 months ago
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆44Mar 30, 2026Updated last week
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 2 months ago
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Oct 8, 2018Updated 7 years ago
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆20Dec 31, 2023Updated 2 years ago
- ☆198Jun 11, 2024Updated last year
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 2 months ago
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated last year
- JWTLens - Burp Suite extension for automated JWT security testing. 62 checks: passive scanning, algorithm confusion, signature bypass, …☆39Mar 19, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automated GitHub secret scanning with smart alerting & monitoring.☆30Jan 15, 2026Updated 2 months ago
- My collection of hacking books for learning information security☆27Dec 25, 2022Updated 3 years ago
- 403 Bypasser With auto payload generation☆12Aug 8, 2024Updated last year
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Aug 18, 2025Updated 7 months ago
- FTP-AnonHunter is a Python tool designed to automate the discovery of anonymous open FTP servers. Using Nmap’s ftp-anon script, the tool …☆10Oct 16, 2024Updated last year
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 6 months ago
- ☆26Feb 21, 2026Updated last month
- Use claude code anywhere.☆61Mar 27, 2026Updated 2 weeks ago
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last month
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆55Mar 5, 2026Updated last month
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Active monitoring bug bounty programs tool☆49Jan 21, 2026Updated 2 months ago
- A resources for who want to learn and get deep into client-side bugs☆426Dec 8, 2024Updated last year
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated 2 years ago
- Reflector: A tool to check for reflected query parameter values.☆12Jan 13, 2023Updated 3 years ago