Automated authorization checks with multiple headers tool written in golang
☆11Jan 3, 2024Updated 2 years ago
Alternatives and similar repositories for AuthInspector
Users that are interested in AuthInspector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆27Feb 4, 2026Updated last month
- Instagram Mass Report Tool☆26Updated this week
- ☆12Feb 17, 2022Updated 4 years ago
- Android App☆13Oct 1, 2020Updated 5 years ago
- ☆12Dec 9, 2022Updated 3 years ago
- Docker files for hosting Pwn challenges,Web Challeges and Python Challenges in CTFs☆20Oct 1, 2020Updated 5 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- This app runs various webview tests to explore the attack surface and exploit techniques☆29Jan 14, 2025Updated last year
- CVE-2024-34102: Unauthenticated Magento XXE☆14Jan 12, 2025Updated last year
- Find hidden directories from domain and subdomain.☆11Mar 27, 2022Updated 3 years ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆65Oct 2, 2019Updated 6 years ago
- ☆26Mar 17, 2026Updated last week
- justCTF [*] 2020 challenges sources☆33Sep 3, 2024Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- Here is a website made with (HTML5, CSS3, SCSS, ReactJs, React-Material-UI) that will display the prices of different crypto-currencies. …☆19Feb 10, 2022Updated 4 years ago
- dev backup for main site☆40Jan 3, 2018Updated 8 years ago
- Chrome extension tool for OSINT & Recon☆57Mar 12, 2024Updated 2 years ago
- Argon2 Hash Cracker☆35May 24, 2023Updated 2 years ago
- A modern, high-performance Point of Sale system for ERPNext with offline capabilities, real-time updates, and intuitive UI.☆98Mar 15, 2026Updated last week
- ☆35May 21, 2025Updated 10 months ago
- CTF-CryptoTool is a tool written in python, for breaking crypto text of CTF challenges. It tries to decode the cipher by bruteforcing it …☆62Apr 7, 2024Updated last year
- Chatbot based Seq2Seq model with bidirectional rnn and attention mechanism with tensorflow, trained on Cornell Movie-Dialogs Corpus and d…☆24Aug 24, 2020Updated 5 years ago
- Writeups of some Reverse Engineering challenges in CTFs I played☆33Aug 26, 2021Updated 4 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆41May 19, 2017Updated 8 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- ☆12Jun 30, 2020Updated 5 years ago
- Mind Maps for penetration testing☆21Feb 4, 2021Updated 5 years ago
- Repository for study material including ebooks, URLs, web pages etc☆24Jul 29, 2023Updated 2 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- A WhatsApp Crashing Tool for Termux☆54Jan 6, 2022Updated 4 years ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆26Jun 25, 2024Updated last year
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆38Jan 26, 2026Updated last month
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year