m8sec / taser
Python resource library for creating security related tooling
☆79Updated 9 months ago
Alternatives and similar repositories for taser:
Users that are interested in taser are comparing it to the libraries listed below
- Striping CDN IPs from a list of IP Addresses☆76Updated 2 years ago
- ☆94Updated 3 years ago
- ☆48Updated 4 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆57Updated 3 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆71Updated 11 months ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 2 weeks ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 2 months ago
- ☆55Updated 2 years ago
- Related subdomains finder☆29Updated 2 years ago
- ☆26Updated 2 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 3 years ago
- ☆20Updated 3 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆27Updated 4 years ago
- ☆47Updated 4 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated 9 months ago
- Simple fork from degoogle original project with bug hunting purposes☆87Updated 2 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆55Updated 2 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆83Updated 3 weeks ago
- Go fish for AWS EIPs☆46Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆26Updated 2 years ago
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆58Updated 4 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 4 years ago