Dig through the Wayback Machine and find sensitive or forgotten files exposed by web servers over time.
☆27Mar 27, 2025Updated last year
Alternatives and similar repositories for Wayback-Sensitive-Finder
Users that are interested in Wayback-Sensitive-Finder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆15Oct 18, 2024Updated last year
- my nuclei templates #new☆10Jun 24, 2024Updated last year
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- ☆13May 18, 2022Updated 3 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆187Oct 7, 2024Updated last year
- Tool to fuzz for interesting vhost.☆24Jan 8, 2025Updated last year
- CVE-2025-3248 Langflow RCE Exploit☆17Jun 17, 2025Updated 9 months ago
- ☆22Jun 24, 2024Updated last year
- ☆23Feb 10, 2026Updated 2 months ago
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆184Feb 10, 2025Updated last year
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆16Oct 16, 2024Updated last year
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆102Apr 4, 2025Updated last year
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆145Feb 10, 2025Updated last year
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- Ollama AI Analyzer runs directly on your local computer, using Ollama's AI models to analyze your HTTP requests and responses. This means…☆32Mar 1, 2025Updated last year
- 📝 My Bug Bounty Writeups☆10Mar 23, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆12Aug 24, 2025Updated 7 months ago
- List of Fresh DNS resolvers updates every 1 hour☆19Updated this week
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- ☆15Jun 26, 2025Updated 9 months ago
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆62Sep 4, 2024Updated last year
- Useful scripts for tampermonkey that I used during bug hunting. Will be updated "au fil de l'eau"☆17Jun 2, 2025Updated 10 months ago
- ☆11Mar 27, 2024Updated 2 years ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Nov 4, 2022Updated 3 years ago