Proyecto para el Jakaton. Intentamos descubirr si existe correlación entre el lenguaje violento contra las mujeres en twitter y el número de feminicidios en México.
☆57Apr 30, 2015Updated 10 years ago
Alternatives and similar repositories for jakaton_feminicidios
Users that are interested in jakaton_feminicidios are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Aug 3, 2022Updated 3 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Apr 3, 2023Updated 2 years ago
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆27Nov 28, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 10 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Apr 23, 2023Updated 2 years ago
- Talosplus is a fast and robust template based Intelligent automation framework primarily developed for Bug Bounty Automation☆92Mar 7, 2023Updated 3 years ago
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated last year
- Recon Automation☆11Sep 14, 2024Updated last year
- ☆36Jun 23, 2022Updated 3 years ago
- A XSS mind map ;)☆57Jan 16, 2016Updated 10 years ago
- A XSS Payload in a gif file☆48Apr 7, 2017Updated 8 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆15Sep 8, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆305Mar 12, 2024Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆77Sep 25, 2023Updated 2 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- Simple Django to show post-exploitation options when server-side template injection (SSTI) is present in app using Django Templates.☆24Jun 1, 2021Updated 4 years ago
- CRLF Detection based on @BlackFan 's work See link below☆16Mar 14, 2024Updated 2 years ago
- Simple tool to gather domains from crt.sh using the organization name☆102Dec 16, 2021Updated 4 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- All linux versions before those accessible in https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/ and https://git.kernel.…☆10Jun 22, 2020Updated 5 years ago
- Smart context-based SSRF vulnerability scanner.☆360May 5, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,503Jan 8, 2026Updated 2 months ago
- A Burp extension to show the Collaborator client in a tab☆36Dec 23, 2022Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Some files for bruteforcing certain things.☆26Jul 12, 2021Updated 4 years ago
- A hacking tool for bug bounties. Sharing and modifying is encouraged!☆242Dec 5, 2022Updated 3 years ago
- The project aims at creating target-specific wordlists for any web application that you are testing.☆66May 28, 2022Updated 3 years ago
- ☆18Jun 28, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Asset inventory of over 800 public bug bounty programs.☆1,526Feb 14, 2025Updated last year
- ☆70Aug 19, 2024Updated last year
- ☆19Sep 18, 2023Updated 2 years ago
- Magic Header Blind Xss tool (deliver blind xss payloads in request headers).☆25May 30, 2021Updated 4 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Feb 22, 2022Updated 4 years ago
- Distribute ordinary bash commands over many systems☆167Aug 29, 2022Updated 3 years ago