☆39Jul 1, 2025Updated 8 months ago
Alternatives and similar repositories for repeat-strike
Users that are interested in repeat-strike are comparing it to the libraries listed below
Sorting:
- Curated UTF-8 URL-encoded character dictionary for injection testing, fuzzing, and bypass techniques against web applications and APIs, f…☆13Sep 20, 2021Updated 4 years ago
- ☆38Nov 24, 2025Updated 3 months ago
- ☆33Feb 27, 2024Updated 2 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago
- Yet Another 403 Bypass Tool☆12Feb 19, 2023Updated 3 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- ☆14Aug 28, 2023Updated 2 years ago
- ☆10Mar 11, 2024Updated 2 years ago
- Jinja2 Template - AdminT Dashboard (Free Version) | AppSeed☆11May 17, 2021Updated 4 years ago
- Server prepared for SSRF post exploitation, javascript exploits and open redirect.☆13Jan 4, 2023Updated 3 years ago
- Digging into private data through Sonarcloud public projects☆11Sep 13, 2024Updated last year
- Regex out URI parameters from backend code, craft URIs to check for reflections or send to local burp proxy☆13Dec 8, 2022Updated 3 years ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆221Sep 25, 2025Updated 5 months ago
- This is the official repository for files needed to complete certain challenges for DawgCTF Spring 2025.☆10Apr 19, 2025Updated 11 months ago
- A curated list of awesome 🏧 hacking resources.☆20Dec 4, 2025Updated 3 months ago
- ☆20Feb 14, 2026Updated last month
- A "simplified" Docker setup script to deploy a local Supabase stack with minimal configuration.☆10Jun 17, 2025Updated 9 months ago
- CVE-2025-4123 - Grafana Tool☆30Jun 4, 2025Updated 9 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆13Feb 23, 2024Updated 2 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆42Feb 6, 2026Updated last month
- This repo hosts an MCP server for volatility3.x☆40Jul 9, 2025Updated 8 months ago
- ThreatTracer - A tool to identify CVE by name & version and more by @FR13ND0x7F☆146Feb 20, 2026Updated last month
- ☆33Apr 22, 2025Updated 10 months ago
- ☆39Sep 25, 2025Updated 5 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- A Python-based backdoor and server communication tool for ethical hacking and reverse shell practice using socket programming.☆28May 21, 2025Updated 10 months ago
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆46Mar 5, 2026Updated 2 weeks ago
- ☆15Jun 5, 2024Updated last year
- ☆12Apr 20, 2025Updated 11 months ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- Expose Spacy nlp text parsing to Nodejs (and other languages) via socketIO☆20Mar 23, 2019Updated 6 years ago
- This service aims to scan the network with WMI, list the packages of the found machines, and get a report of these packages.☆14Mar 7, 2024Updated 2 years ago
- Patrick's C Compiler (interpreter)☆19Jun 12, 2019Updated 6 years ago
- Nuclear Powered Command-Line Tools☆12Nov 21, 2018Updated 7 years ago