List of Mine Private wordlist i use for fuzzing
☆95Feb 25, 2026Updated 2 months ago
Alternatives and similar repositories for MINE-Wordlist
Users that are interested in MINE-Wordlist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆49Feb 6, 2026Updated 3 months ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- ☆51Aug 2, 2025Updated 9 months ago
- Final and fully functional Car pooling app with database hosted on hostinger.in☆12Dec 7, 2017Updated 8 years ago
- collection of blogs about malware development and analysis☆74Dec 2, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- React2Shell Ultimate - The most comprehensive CVE-2025-66478 Scanner for Next.js RSC RCE vulnerability. Multi-mode detection, WAF bypass,…☆148Dec 10, 2025Updated 5 months ago
- ☆33Jan 16, 2026Updated 4 months ago
- 🔍 SubWatch – Automated Subdomain Monitoring Script☆45Jun 13, 2025Updated 11 months ago
- Online Auction is a online platform for auction and this project is made using PHP 5, MySQL, Javascript, JQuery, Bootstrap and HTML☆16Sep 25, 2016Updated 9 years ago
- ☆31Sep 9, 2025Updated 8 months ago
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 3 years ago
- Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine☆112Apr 7, 2026Updated last month
- ☆46Mar 30, 2026Updated last month
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Oct 8, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 4 months ago
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆20Dec 31, 2023Updated 2 years ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 3 months ago
- ☆206Jun 11, 2024Updated last year
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated 2 years ago
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 4 months ago
- Automated GitHub secret scanning with smart alerting & monitoring.☆31Jan 15, 2026Updated 4 months ago
- 403 Bypasser With auto payload generation☆12Aug 8, 2024Updated last year
- JWTLens - Burp Suite extension for automated JWT security testing. 62 checks: passive scanning, algorithm confusion, signature bypass, …☆51Mar 19, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Interactive XSS Labs to get into Client-Side Hacking☆87Feb 25, 2026Updated 2 months ago
- ☆26Feb 21, 2026Updated 3 months ago
- Grafana scanner with all public CVEs that I collected in one script to make grafana testing easier☆159Updated this week
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆41Oct 6, 2025Updated 7 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Use claude code anywhere.☆63Apr 19, 2026Updated last month
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆20Feb 20, 2026Updated 3 months ago
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆30Apr 12, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Active monitoring bug bounty programs tool☆49Jan 21, 2026Updated 4 months ago
- ☆14Jul 13, 2020Updated 5 years ago
- Reflector: A tool to check for reflected query parameter values.☆12Jan 13, 2023Updated 3 years ago
- Tips for manually detect & exploit SQL injection Vulnerability : MySQL☆17Aug 17, 2022Updated 3 years ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated 2 years ago
- A resources for who want to learn and get deep into client-side bugs☆536Dec 8, 2024Updated last year
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆48Apr 23, 2026Updated 3 weeks ago