☆106Nov 20, 2025Updated 3 months ago
Alternatives and similar repositories for Huzaif-Ahmed-Portfolio-Sixth
Users that are interested in Huzaif-Ahmed-Portfolio-Sixth are comparing it to the libraries listed below
Sorting:
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 3 years ago
- OffGrid LLM is a production-ready, self-contained LLM orchestrator designed for environments with limited or no internet connectivity. De…☆48Jan 13, 2026Updated last month
- ☆38Mar 8, 2022Updated 4 years ago
- ☆77Sep 27, 2024Updated last year
- Collect XSS vulnerable parameters from entire domain.☆155Jul 29, 2022Updated 3 years ago
- Google IP Search Engine☆163Apr 29, 2022Updated 3 years ago
- Jeeves SQLI Finder☆215May 13, 2022Updated 3 years ago
- A collection of Sci-Fi themed components and futuristic design elements for modern web applications.☆521Jul 18, 2025Updated 7 months ago
- Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection☆288Nov 29, 2024Updated last year
- information gathering☆281Jul 12, 2025Updated 7 months ago
- Course repository for PowerShell for Pentesters Course☆439Mar 9, 2022Updated 4 years ago
- BugBountyTips☆413Jul 31, 2025Updated 7 months ago
- ☆846Nov 4, 2024Updated last year
- OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework.☆540Jun 7, 2020Updated 5 years ago
- My OSCP Pre-Preparation Phase. I'm not sure if I'll be able to afford the exam but what count's trying and learning things. I'm gonna giv…☆569Nov 4, 2022Updated 3 years ago
- The most powerful CRLF injection (HTTP Response Splitting) scanner.☆592Oct 17, 2023Updated 2 years ago
- UI component library for React, Next.js, and other JSX frameworks. Built with Tailwind CSS, it makes creating beautiful, interactive and …☆1,280Feb 18, 2026Updated 2 weeks ago
- Collection of Facebook Bug Bounty Writeups☆706Jan 16, 2026Updated last month
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆740May 19, 2023Updated 2 years ago
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆723Jun 24, 2025Updated 8 months ago
- A community-powered collection of all known bug bounty platforms, vulnerability disclosure platforms, and crowdsourced security platforms…☆870Mar 1, 2026Updated last week
- Helped during my OSCP lab days.☆822Mar 5, 2025Updated last year
- A wordlist of API names for web application assessments☆870Jun 17, 2025Updated 8 months ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,035Jun 3, 2021Updated 4 years ago
- ☆1,116Jul 26, 2023Updated 2 years ago
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,177Aug 16, 2023Updated 2 years ago
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,286Sep 12, 2025Updated 5 months ago
- PhoneInfoga is one of the most advanced tools to scan phone numbers using only free resources.☆1,384Mar 27, 2021Updated 4 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,282Jan 29, 2026Updated last month
- The fastest dork scanner written in Go.☆1,277Feb 4, 2024Updated 2 years ago
- Watch the course: https://youtu.be/G3e-cpL7ofc☆1,914Dec 27, 2025Updated 2 months ago
- Fast GitHub recon tool. Scans for leaked secrets across all of GitHub, not just known repos and orgs. Support for GitHub dorks.☆1,405Feb 10, 2026Updated last month
- A collection of one-liners for bug bounty hunting.☆1,427Jan 21, 2025Updated last year
- Binaries for the book Practical Malware Analysis☆1,457Jun 14, 2022Updated 3 years ago
- A collection of most useful osint tools for SOCINT.☆1,692Jan 30, 2026Updated last month
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,530Updated this week
- A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting☆1,776Sep 29, 2025Updated 5 months ago
- ☆1,394Apr 25, 2021Updated 4 years ago
- Professional-grade background patterns and gradients for your websites and apps. Easily copy and paste into your next project. Crafted wi…☆2,833Jan 11, 2026Updated last month