Traverse JS files for APIs/Endpoints
☆15May 12, 2015Updated 10 years ago
Alternatives and similar repositories for enumapis
Users that are interested in enumapis are comparing it to the libraries listed below
Sorting:
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Oct 21, 2014Updated 11 years ago
- Abusing trust boundaries to deliver effective phishing payloads☆35Dec 8, 2015Updated 10 years ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions☆226Mar 29, 2022Updated 3 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Mar 24, 2015Updated 10 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- Enhanced QDLink without handbreak detection and many other restrictions.☆11Apr 13, 2023Updated 2 years ago
- This changes the style of Burp Suite's Repeater tabs to help the testers☆29Jul 3, 2019Updated 6 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- A simple python script that exploits blind SQL Injections. Useful for PoCs.☆26Jul 31, 2013Updated 12 years ago
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- An Ansible role for installing Cobalt Strike.☆80Dec 22, 2025Updated 2 months ago
- OWASP Skanda - SSRF Exploitation Framework☆38Jul 6, 2013Updated 12 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- pongoOS☆10Feb 15, 2024Updated 2 years ago
- Bypass Xiaomi RSA 256 EDL Auth☆13Sep 2, 2025Updated 6 months ago
- An interactive OOB XXE data exfiltration tool☆92May 31, 2017Updated 8 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- ☆38Oct 12, 2020Updated 5 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Data from my Sunday streams☆75Jul 28, 2019Updated 6 years ago
- Analysis of DNS records to find popular trends☆448Mar 10, 2016Updated 9 years ago
- ☆11Feb 11, 2026Updated 2 weeks ago
- Bot to bypass instagram block feature☆10Jun 21, 2017Updated 8 years ago
- ☆12Jul 16, 2017Updated 8 years ago
- 2024 - CANCELED AT REQUEST OF SAMSUNG. This Magisk Module was going to attempt to add missing engineering/combination framework to the de…☆11Jul 18, 2024Updated last year
- A set of NRF24 apps for the Flipper Zero running an unmodified original firmware.☆10Aug 25, 2023Updated 2 years ago