halvtomat / swedish-passwordsLinks
Analysis of Swedish password usage
☆14Updated last year
Alternatives and similar repositories for swedish-passwords
Users that are interested in swedish-passwords are comparing it to the libraries listed below
Sorting:
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆44Updated last year
- ☆20Updated last month
- An advanced JavaScript reconnaissance tool for endpoints, secrets, and more☆13Updated 2 months ago
- A quick bug bounty guide for beginners☆78Updated last month
- Here you can find mostly all disclosed h1 reports☆25Updated 3 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆123Updated 9 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 9 months ago
- ☆112Updated 4 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆180Updated this week
- ☆20Updated 7 months ago
- This repository contains cheatsheets and payloads compiled from completing the labs at PortSwigger Academy.☆98Updated 6 months ago
- Bug Bounty Tools used on Twitch - Recon☆304Updated 9 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆135Updated last month
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆137Updated 8 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆95Updated last year
- ☆56Updated 2 years ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆72Updated 3 months ago
- Auto Recon tool for finding SQLi,XSS,LFi,OpenRedirect☆35Updated 3 months ago
- A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.☆161Updated 10 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆215Updated 6 months ago
- ☆184Updated 10 months ago
- ☆26Updated 4 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆251Updated 2 months ago
- Here are the most interesting Shodan dorks (according to me)☆81Updated last year
- ☆74Updated 9 months ago
- ☆65Updated 2 months ago
- My attempt at making an obsidian theme☆20Updated this week
- Used to create range of date, could be usefull to create wordlist base on dates.☆11Updated 2 years ago
- Shodan Dorks☆408Updated 4 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆295Updated last year