james-s-tayler / grep-sed-awk-magicLinks
Magic tricks using grep, sed and awk
☆27Updated 3 years ago
Alternatives and similar repositories for grep-sed-awk-magic
Users that are interested in grep-sed-awk-magic are comparing it to the libraries listed below
Sorting:
- commands☆27Updated 4 years ago
- Application for logging HTTP and DNS Requests☆15Updated 4 years ago
- ☆38Updated 4 years ago
- Script for Reconnaissance(Bug Bounty)☆18Updated 3 years ago
- ☆19Updated 4 years ago
- A solid recon tool I use personally.☆30Updated 2 years ago
- Filter URLs to save your time.☆60Updated 3 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆57Updated 3 years ago
- Android Pentest Setup Environment☆30Updated 3 years ago
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆13Updated 4 years ago
- I collected it to help the bug hunter get a reward☆58Updated 2 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Updated 4 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- Noobish Recon Automation☆21Updated last year
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Updated 3 years ago
- ☆22Updated 4 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Updated 3 years ago
- Exploit scripts☆12Updated 3 years ago
- A Collection of Wordlists for Penetration Testing☆21Updated 7 months ago
- ☆21Updated 2 years ago
- ☆13Updated 3 years ago
- script python to check url list via cookies and Authorization☆19Updated 2 years ago
- One liner regex match to search inside JS files, using curl and grep!☆29Updated 3 years ago
- ☆38Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Updated 4 years ago
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆35Updated 4 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- Script for Bug Bounty☆29Updated 3 years ago
- Automate bug bounty recon using bash alias☆14Updated last year