m8sec / taser
Python resource library for creating security related tooling
☆79Updated 9 months ago
Alternatives and similar repositories for taser:
Users that are interested in taser are comparing it to the libraries listed below
- Striping CDN & WAF IPs from a list of IP Addresses☆77Updated this week
- A simple tool which makes creating nuclei templates even easier.☆36Updated 10 months ago
- Related subdomains finder☆29Updated 2 years ago
- Go fish for AWS EIPs☆46Updated 4 years ago
- Compiles a list of major CDN and WAF subnets.☆66Updated this week
- ☆94Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- ☆48Updated 4 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆62Updated 4 months ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆57Updated 3 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- A simple tool to detect wildcards domain based on Amass's wildcards detector.☆64Updated 4 years ago
- ☆35Updated 3 months ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 3 years ago
- ☆26Updated 2 years ago
- ☆30Updated last year
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆59Updated 5 months ago
- A fingerprint generation helper for nuclei network templates☆72Updated 2 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Web CTF CheatSheet 🐈☆34Updated 6 years ago
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- a deterministic finite automata ranker☆70Updated 3 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- XSS reflector vulnerabilities exploitation extended.☆27Updated 3 years ago
- goverview - Get an overview of the list of URLs☆142Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆71Updated 2 years ago