hackvertor / repeat-strikeLinks
☆38Updated 3 months ago
Alternatives and similar repositories for repeat-strike
Users that are interested in repeat-strike are comparing it to the libraries listed below
Sorting:
- ☆47Updated 7 months ago
- ☆31Updated 6 months ago
- FrogPost: postMessage Security Testing Tool☆98Updated this week
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆44Updated 3 months ago
- A Burp extension to help pentesters copy requests / responses for reports.☆50Updated 3 months ago
- Adobe Experience Manager (AEM) hacking toolkit☆85Updated 3 weeks ago
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆47Updated last month
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆127Updated 3 years ago
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆27Updated 11 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆260Updated this week
- A tool for inspecting and analyzing mobile application storage files.☆47Updated 5 months ago
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆79Updated 7 months ago
- ☆49Updated 3 weeks ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- A simple browser extension to quickly find interesting security-related information on a webpage.☆99Updated this week
- A collection of Turbo Intruder scripts.☆66Updated 8 months ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆41Updated 4 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆13Updated 8 months ago
- ☆105Updated last year
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Updated last year
- ai-based domain name generation☆95Updated 8 months ago
- vhost scanning☆36Updated last year
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 9 months ago
- ☆55Updated last year
- ☆28Updated last year
- Tool to parse subdomains from dmarc.live☆145Updated last year
- ☆94Updated 6 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆96Updated 2 months ago
- ☆36Updated 10 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆140Updated 6 months ago