imrannissar / awk-and-sedView external linksLinks
commands
☆27Nov 5, 2020Updated 5 years ago
Alternatives and similar repositories for awk-and-sed
Users that are interested in awk-and-sed are comparing it to the libraries listed below
Sorting:
- Magic tricks using grep, sed and awk☆27Jul 28, 2022Updated 3 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago
- Passively check for XSS character encodings☆18Feb 7, 2026Updated last week
- ☆21Dec 4, 2014Updated 11 years ago
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆49Sep 1, 2025Updated 5 months ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- Nuclei templates which I wrote myself☆10Jan 8, 2022Updated 4 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- ☆13Mar 15, 2022Updated 3 years ago
- Tool for CVE-2022-1388☆14May 13, 2022Updated 3 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- Spring4Shell Burp Scanner☆71Apr 3, 2022Updated 3 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Aug 18, 2020Updated 5 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 4 years ago
- IIS shortname scanner + bruteforce☆54Feb 18, 2024Updated last year
- ☆36Jun 23, 2022Updated 3 years ago
- Optimized WordLists for Pentesting☆16Feb 6, 2020Updated 6 years ago
- This Repo Contain Summary of The eLearnSecurity Web Application Penetration Tester certification Content☆20Apr 9, 2022Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆60May 10, 2022Updated 3 years ago
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Dec 20, 2017Updated 8 years ago
- Burp Suite extension to log GraphQL operations as a comment☆23Aug 9, 2021Updated 4 years ago
- ☆63Aug 22, 2024Updated last year
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- my templates for the nuclei engine to find security vulnerabilities.☆10Aug 19, 2024Updated last year
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- A miscellany of thoughts.☆48Mar 31, 2024Updated last year
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- Some of the gf patterns which i use☆44Jan 19, 2022Updated 4 years ago
- Apache Flink 目录遍历漏洞批量检测 (CVE-2020-17519)☆48Jan 6, 2021Updated 5 years ago
- A collection of notes, checklists, writeups on bug bounty hunting and web application security.☆152Jun 30, 2022Updated 3 years ago