Proyecto para el Jakaton. Intentamos descubirr si existe correlación entre el lenguaje violento contra las mujeres en twitter y el número de feminicidios en México.
☆57Apr 30, 2015Updated 11 years ago
Alternatives and similar repositories for jakaton_feminicidios
Users that are interested in jakaton_feminicidios are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Aug 3, 2022Updated 3 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Apr 3, 2023Updated 3 years ago
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆28Nov 28, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 5 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Apr 23, 2023Updated 3 years ago
- Talosplus is a fast and robust template based Intelligent automation framework primarily developed for Bug Bounty Automation☆92Mar 7, 2023Updated 3 years ago
- Bug Bounty Recon Tools☆27Apr 13, 2024Updated 2 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- ☆37Jun 23, 2022Updated 3 years ago
- A XSS mind map ;)☆56Jan 16, 2016Updated 10 years ago
- A XSS Payload in a gif file☆48Apr 7, 2017Updated 9 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆15Sep 8, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆305Mar 12, 2024Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆77Sep 25, 2023Updated 2 years ago
- ☆17Oct 30, 2022Updated 3 years ago
- Simple Django to show post-exploitation options when server-side template injection (SSTI) is present in app using Django Templates.☆24Jun 1, 2021Updated 4 years ago
- CRLF Detection based on @BlackFan 's work See link below☆17Mar 14, 2024Updated 2 years ago
- Simple tool to gather domains from crt.sh using the organization name☆102Dec 16, 2021Updated 4 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- All linux versions before those accessible in https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/ and https://git.kernel.…☆11Jun 22, 2020Updated 5 years ago
- Smart context-based SSRF vulnerability scanner.☆361May 5, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,512Jan 8, 2026Updated 4 months ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A hacking tool for bug bounties. Sharing and modifying is encouraged!☆243Dec 5, 2022Updated 3 years ago
- Some files for bruteforcing certain things.☆27Jul 12, 2021Updated 4 years ago
- The project aims at creating target-specific wordlists for any web application that you are testing.☆66May 28, 2022Updated 3 years ago
- ☆18Jun 28, 2020Updated 5 years ago
- ☆19Sep 18, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Asset inventory of over 800 public bug bounty programs.☆1,543Feb 14, 2025Updated last year
- ☆70Aug 19, 2024Updated last year
- ☆27Jul 30, 2021Updated 4 years ago
- Magic Header Blind Xss tool (deliver blind xss payloads in request headers).☆25May 30, 2021Updated 4 years ago
- Slurps down the most popular plugins and themes from WordPress.org☆17Feb 14, 2026Updated 2 months ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Feb 22, 2022Updated 4 years ago
- Distribute ordinary bash commands over many systems☆167Aug 29, 2022Updated 3 years ago