List of Mine Private wordlist i use for fuzzing
☆92Feb 25, 2026Updated 2 months ago
Alternatives and similar repositories for MINE-Wordlist
Users that are interested in MINE-Wordlist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆51Aug 2, 2025Updated 8 months ago
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆149Apr 14, 2026Updated 2 weeks ago
- ☆33Jan 16, 2026Updated 3 months ago
- ☆105Mar 18, 2026Updated last month
- 🔍 SubWatch – Automated Subdomain Monitoring Script☆43Jun 13, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 3 years ago
- Grafana scanner with all public CVEs that I collected in one script to make grafana testing easier☆78Feb 15, 2026Updated 2 months ago
- ☆31Sep 9, 2025Updated 7 months ago
- ☆44Mar 30, 2026Updated last month
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Oct 8, 2018Updated 7 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 3 months ago
- ☆204Jun 11, 2024Updated last year
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- JWTLens - Burp Suite extension for automated JWT security testing. 62 checks: passive scanning, algorithm confusion, signature bypass, …☆44Mar 19, 2026Updated last month
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 3 months ago
- Automated GitHub secret scanning with smart alerting & monitoring.☆31Jan 15, 2026Updated 3 months ago
- 403 Bypasser With auto payload generation☆12Aug 8, 2024Updated last year
- FTP-AnonHunter is a Python tool designed to automate the discovery of anonymous open FTP servers. Using Nmap’s ftp-anon script, the tool …☆10Oct 16, 2024Updated last year
- Interactive XSS Labs to get into Client-Side Hacking☆86Feb 25, 2026Updated 2 months ago
- ☆26Feb 21, 2026Updated 2 months ago
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Apr 8, 2026Updated 3 weeks ago
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 6 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Use claude code anywhere.☆62Apr 19, 2026Updated last week
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆19Feb 20, 2026Updated 2 months ago
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Apr 12, 2026Updated 2 weeks ago
- My collection of hacking books for learning information security☆31Dec 25, 2022Updated 3 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated 2 years ago
- Reflector: A tool to check for reflected query parameter values.☆12Jan 13, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tips for manually detect & exploit SQL injection Vulnerability : MySQL☆17Aug 17, 2022Updated 3 years ago
- ☆20Apr 16, 2026Updated 2 weeks ago
- A resources for who want to learn and get deep into client-side bugs☆530Dec 8, 2024Updated last year
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Apr 23, 2026Updated last week
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 3 years ago
- ☆65Sep 8, 2025Updated 7 months ago