☆22Apr 29, 2025Updated 10 months ago
Alternatives and similar repositories for 100Days
Users that are interested in 100Days are comparing it to the libraries listed below
Sorting:
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆29Nov 7, 2023Updated 2 years ago
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆54Dec 9, 2024Updated last year
- Custom nuclei templates for bug hunting.....☆26May 30, 2024Updated last year
- A subdomain fuzzing tool☆172Jun 1, 2024Updated last year
- ☆29May 22, 2024Updated last year
- ☆11Jun 10, 2025Updated 8 months ago
- ☆13Jan 8, 2024Updated 2 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- ☆10Jan 25, 2023Updated 3 years ago
- ☆13Mar 6, 2025Updated 11 months ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- ☆96May 15, 2020Updated 5 years ago
- ☆11Oct 31, 2021Updated 4 years ago
- SCIENCE, HACKING AND SECURITY☆13May 23, 2022Updated 3 years ago
- ☆17Jun 21, 2024Updated last year
- A multi coroutine concurrent batch URL survival detection tool written in Go, with concurrency determined by CPU by default.一个go编写的多协程并发批…☆12Jan 9, 2024Updated 2 years ago
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- ☆129Aug 19, 2025Updated 6 months ago
- This is a collection of wordlists depending upon use cases☆10Jul 27, 2023Updated 2 years ago
- Library for Hackers☆28Oct 8, 2024Updated last year
- ☆16Jun 3, 2025Updated 8 months ago
- An evolving set of solana ctf challenges and vulnerabilties☆15Jun 4, 2025Updated 8 months ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Free open-source information gathering☆11Mar 20, 2023Updated 2 years ago
- This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for W…☆12Apr 22, 2024Updated last year
- 10,000 H1 Disclosed Reports☆118May 10, 2024Updated last year
- ☆46Oct 7, 2021Updated 4 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- Bypass CDN/WAF☆13Dec 11, 2023Updated 2 years ago
- burpsuite 插件 根据配置简单规则编辑通过的HTTP流量包☆14Feb 27, 2023Updated 3 years ago
- some cheat sheet for bash & etc.☆13Jul 18, 2023Updated 2 years ago
- ☆12May 31, 2023Updated 2 years ago
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16May 8, 2025Updated 9 months ago
- 语雀敏感信息泄露搜索工具☆13Jan 20, 2023Updated 3 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- ☆21Feb 10, 2026Updated 2 weeks ago