m8sec / taser
Python resource library for creating security related tooling
☆78Updated 2 months ago
Related projects: ⓘ
- Striping CDN IPs from a list of IP Addresses☆72Updated 2 years ago
- ☆47Updated 3 years ago
- ☆47Updated last week
- ☆41Updated last year
- A simple tool which makes creating nuclei templates even easier.☆35Updated 2 months ago
- Custom scripts for directory fuzzing, subdomain enumeration, and more.☆43Updated 2 years ago
- Related subdomains finder☆29Updated 2 years ago
- Target practice for ffuf☆55Updated 3 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆59Updated 3 years ago
- ☆92Updated 3 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆54Updated last year
- A Web-UI for subdomain enumeration (subfinder)☆53Updated 4 years ago
- ☆37Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆67Updated 5 months ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆50Updated 2 years ago
- Detects request smuggling via HTTP/2 downgrades.☆92Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆69Updated last year
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆33Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆56Updated 4 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆79Updated 4 months ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆53Updated 2 years ago
- Prototype Pollution Scanner☆99Updated 3 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆39Updated 11 months ago
- Searching for virtual hosts among non-resolvable domains☆86Updated 4 years ago
- Web CTF CheatSheet 🐈☆33Updated 5 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 3 years ago