BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.
☆11Jan 1, 2021Updated 5 years ago
Alternatives and similar repositories for BestRecon
Users that are interested in BestRecon are comparing it to the libraries listed below
Sorting:
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- Good resources about web security that I have read.☆27Jul 23, 2023Updated 2 years ago
- Sync RGB devices to your spotify songs. Sync your keyboard, sync your headset, sync your mouse, sync your toaster, sync your toilet, sync…☆35Feb 1, 2021Updated 5 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- Git folder digger, I'm sure it's worthwhile stuff.☆38Jan 10, 2021Updated 5 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 4 years ago
- Fastest recursive HTTP fuzzer, like a Ferrari.☆91Nov 27, 2020Updated 5 years ago
- ☆12Sep 23, 2023Updated 2 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- apkizer is a mass downloader for android applications for all available versions.☆46Aug 11, 2021Updated 4 years ago
- Akgulyzer; komut satiri rastgele metin uretici ve encoder.☆20Feb 10, 2015Updated 11 years ago
- a benchmarking&stressing tool that can send raw HTTP requests☆164Sep 24, 2022Updated 3 years ago
- My solutions to the 2020 NSA Codebreaker Challenge☆73May 14, 2021Updated 4 years ago
- Log4j for nuclei☆68Dec 13, 2021Updated 4 years ago
- Script to test open Akamai ARL vulnerability.☆69Aug 11, 2021Updated 4 years ago
- ☆32Sep 6, 2021Updated 4 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- ☆14Feb 2, 2023Updated 3 years ago
- KPI Reporter is a dev-friendly, on-premises tool for crafting automated reports on what matters to you.☆10Oct 6, 2022Updated 3 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆37Nov 8, 2017Updated 8 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- CNVD-2021-10543:MessageSolution 企业邮件归档管理系统 EEA 存在信息泄露漏洞☆13Mar 28, 2021Updated 4 years ago
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- ☆13Sep 23, 2025Updated 5 months ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- An API for escaping different kind of queries☆14Jun 30, 2021Updated 4 years ago
- Welcome to my dungeon. Here, I keep all my configuration files in case I have a stroke and lose all my memory. You're very welcome to exp…☆38Feb 9, 2026Updated 2 weeks ago
- Markov Model libraries, optimized for cracking-focused password generations.☆112Jul 8, 2021Updated 4 years ago
- ☆11May 15, 2020Updated 5 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- ☆11Jan 23, 2025Updated last year
- Xavier Framework is a user interface wrapper built on top of the Volatility(c) memory forensics framework.☆46Jul 7, 2022Updated 3 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- 泛微OA V8 SQL注入☆10Apr 11, 2021Updated 4 years ago