☆27Sep 5, 2025Updated 6 months ago
Alternatives and similar repositories for Dynamic-Path-Traversal-Tester
Users that are interested in Dynamic-Path-Traversal-Tester are comparing it to the libraries listed below
Sorting:
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- ☆15Jan 27, 2022Updated 4 years ago
- Unified Vulnerability Intelligence Platform☆64Dec 21, 2025Updated 2 months ago
- BackupFinder discovers backup files on web servers by generating intelligent patterns.☆103Jul 29, 2025Updated 7 months ago
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- Lazy Load WordPress Images, Videos, Iframes to improve your website performance.☆11Jan 29, 2026Updated last month
- Remove unnecessary headers, cookies, and query parameters from a curl command while ensuring the response remains the same.☆52Jun 14, 2025Updated 8 months ago
- A-to-Z Bug Bounty Hunting Tools☆91Mar 26, 2025Updated 11 months ago
- AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)☆170Feb 22, 2026Updated last week
- ☆11Aug 25, 2018Updated 7 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- ☆27Nov 20, 2025Updated 3 months ago
- A curated list of 20 free hacking books that cover various aspects of cybersecurity, ethical hacking, and penetration testing. This repos…☆37Dec 15, 2025Updated 2 months ago
- A FullC2 Framework TUI + Web UI That Focuses On Network Stressing☆14Aug 24, 2025Updated 6 months ago
- Inspired by the Tryhackme.com Room "Python for Pentesters"☆10Jun 9, 2024Updated last year
- This repository contains study materials, notes, and resources to prepare for the Blue Team Level 1 (BTL1) certification exam.☆93Apr 13, 2025Updated 10 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- ☆20Sep 27, 2024Updated last year
- ☆12Mar 7, 2025Updated 11 months ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆12Nov 8, 2022Updated 3 years ago
- Templtor is a bash script that will gather all the community Nuclei templates.☆30Dec 19, 2025Updated 2 months ago
- free5GC official site☆14Feb 24, 2026Updated last week
- Detectify is a deep learning system that detects AI-generated fake videos (deepfakes) using CNN and LSTM-based RNNs. Trained on datasets …☆17Jun 6, 2024Updated last year
- ☆16Jan 23, 2026Updated last month
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 10 months ago
- bash shell setup with bash-now. ⇄ 0devco & code4mk☆13Jan 26, 2019Updated 7 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆25Jan 31, 2026Updated last month
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago