☆24Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for custom-wordlists
Users that are interested in custom-wordlists are comparing it to the libraries listed below
Sorting:
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- gathers the XSS cheatsheet payloads and creates a usable wordlist☆74Jan 4, 2021Updated 5 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- Web testing application.☆16Aug 26, 2024Updated last year
- Hunt and Analyze Tor Onion Sites☆23Dec 8, 2022Updated 3 years ago
- WaybackURLS + OtxURLS + CommonCrawl = The Best Results☆22Dec 7, 2019Updated 6 years ago
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- Springboot detection☆23Nov 8, 2021Updated 4 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- Keycloak admin API allows low privilege users to use administrative functions☆28Oct 12, 2024Updated last year
- CVE-2022-41040 nuclei template☆19Oct 2, 2022Updated 3 years ago
- Get list of subsidiaries for a selected company☆31Dec 21, 2024Updated last year
- ☆24Jan 26, 2021Updated 5 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- Shodan Favicon Hash Generator By Aziz Hakim @eternyle☆26May 25, 2024Updated last year
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30May 6, 2020Updated 5 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, …☆27May 9, 2022Updated 3 years ago
- Script for Bug Bounty☆29Sep 17, 2021Updated 4 years ago
- Check a list of websites if they have a specific cms installed and show their versions.☆26Aug 7, 2020Updated 5 years ago
- Various wordlists☆73Dec 12, 2025Updated 2 months ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Top password lists generated from leaks collected from different paste sites☆33Dec 20, 2022Updated 3 years ago
- CTF, wargame cheatsheet☆32Nov 29, 2018Updated 7 years ago
- This details how I create and use my password cracking setup☆32Nov 4, 2022Updated 3 years ago
- Source for Pentester Land☆39Nov 3, 2022Updated 3 years ago
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- poc☆27Nov 14, 2020Updated 5 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit☆38Feb 8, 2025Updated last year
- You can read the writeup on this script here☆192Sep 30, 2021Updated 4 years ago