james-s-tayler / grep-sed-awk-magic
Magic tricks using grep, sed and awk
☆27Updated 2 years ago
Alternatives and similar repositories for grep-sed-awk-magic:
Users that are interested in grep-sed-awk-magic are comparing it to the libraries listed below
- commands☆27Updated 4 years ago
- Official Android Pentesting Slide By RootBakar☆15Updated 3 years ago
- ☆10Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆56Updated 3 years ago
- ☆21Updated 4 years ago
- Web application pentesting recon☆23Updated 4 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 2 years ago
- ☆10Updated last year
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆34Updated 4 years ago
- ☆19Updated 3 years ago
- Xss payload for bypassing waf☆15Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Updated 3 years ago
- ☆22Updated 3 years ago
- ☆19Updated 3 years ago
- ☆38Updated 3 years ago
- Automate bug bounty recon using bash alias☆14Updated 7 months ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆24Updated 3 years ago
- Creating a Database for Mass Recon☆12Updated 4 years ago
- ☆20Updated last year
- Ffuf output browser☆39Updated 2 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Updated 3 years ago
- Script for Reconnaissance(Bug Bounty)☆18Updated 2 years ago
- Top level domain scanner in Go☆30Updated last year
- Cool One Liners at one place to make your recon and bug bounty skills better !☆16Updated 4 years ago
- A BurpSuite plugin for BBRF☆24Updated 4 months ago
- Exploits for different vulnerabilities☆12Updated 3 years ago
- Automate your subdomain enumeration, subdomain takeover, management, nuclei, etc. in one go.☆10Updated 2 years ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆13Updated 10 months ago
- Load your data into burp☆10Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 7 months ago