lc / hacks
Repo of useful scripts
☆104Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for hacks
- ☆28Updated 3 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 5 years ago
- Push notifications for passive DNS data☆107Updated 8 years ago
- jenkinz is a tool to retrieve every build for every job ever created and run on a given Jenkins instance.☆66Updated 5 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆137Updated 5 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆75Updated 4 years ago
- Bug Bounty Dork☆67Updated 2 years ago
- A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!☆84Updated 4 years ago
- Reclaim control of your Burp Suite Repeater tabs with this powerful extension☆66Updated 3 years ago
- subdomain bruteforce list☆98Updated last month
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆100Updated 4 years ago
- Various Payload wordlists☆235Updated 4 years ago
- A Broken-URL Checker☆80Updated 7 years ago
- Fetch known urls from AlienVault's Open Threat Exchange for given hosts☆60Updated 5 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆205Updated 4 years ago
- Data from my Sunday streams☆72Updated 5 years ago
- ☆58Updated 3 years ago
- XSS Hunter Burp Plugin☆148Updated 6 years ago
- HTTP parameter discovery suite.☆94Updated 4 years ago
- BurpSuite extension to inject custom cross-site scripting payloads on every form/request submitted to detect blind XSS vulnerabilities☆107Updated last year
- Make concurrent requests with the curl command-line tool☆72Updated 5 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆78Updated 5 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆162Updated 5 years ago
- sub domain wild card filtering tool☆41Updated 4 years ago
- ☆60Updated 3 months ago
- Implementation of Wappalyzer in Python☆55Updated last year
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆131Updated last year