jhaddix / ios_shView external linksLinks
ios source grepper
☆42May 4, 2017Updated 8 years ago
Alternatives and similar repositories for ios_sh
Users that are interested in ios_sh are comparing it to the libraries listed below
Sorting:
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 8 years ago
- A static website template for security pages.☆19Jun 29, 2018Updated 7 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆19Jun 2, 2017Updated 8 years ago
- See the history of a file from above☆17Aug 1, 2017Updated 8 years ago
- Usefull stuff from around teh internetz☆115Oct 30, 2017Updated 8 years ago
- ☆13Jul 19, 2017Updated 8 years ago
- Hello and welcome to my GitHub account. If you'd like to know more about me, this is likely the best place to start☆16Oct 4, 2017Updated 8 years ago
- Chrome Extension for XSS Hunter Payloads☆14Sep 7, 2016Updated 9 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆13Jul 20, 2017Updated 8 years ago
- Ease-of-use extension for Web Application penetration testing☆23Jun 20, 2017Updated 8 years ago
- PwnWiki - The notes section of the pentesters mind.☆27May 20, 2014Updated 11 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆16Mar 17, 2018Updated 7 years ago
- Combines the speed of masscan with the reliability and detailed enumeration of nmap☆17Aug 16, 2017Updated 8 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆45Mar 13, 2018Updated 7 years ago
- A python script that finds endpoints in JavaScript files☆46Sep 5, 2019Updated 6 years ago
- Community curated list of template files for the nuclei engine to find security vulnerability and fingerprinting the targets.☆34Aug 3, 2020Updated 5 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆23Jun 28, 2020Updated 5 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆27Feb 29, 2016Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 11 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Oct 7, 2015Updated 10 years ago
- Small util to dump the IDT table of a running OS X system with kmem enabled☆21May 5, 2014Updated 11 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids.☆32Jul 1, 2018Updated 7 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- In-depth DNS Enumeration and Network Mapping☆36Mar 10, 2019Updated 6 years ago
- ☆95May 26, 2019Updated 6 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- An implementation of an extension of the Local Descriptors Encoded by Fisher Vectors method for person re-identification.☆13Nov 30, 2014Updated 11 years ago
- CTF Team -TeamRocketIST's website source code.☆17Aug 21, 2023Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago