mufeedvh / l33tmario
Mario the game but you rescue the princess by hacking.
☆22Updated 2 years ago
Alternatives and similar repositories for l33tmario:
Users that are interested in l33tmario are comparing it to the libraries listed below
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- A collection of simple tools and poc-builders☆39Updated last year
- Automated Web Recon Shell Scripts☆50Updated 3 years ago
- Fast Endpoint Scanner☆53Updated 4 years ago
- Just some public notes that can be useful and i want let the world knows.☆87Updated 4 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- grapX will iterate through the URLs and grep the endpoints with all possible extensions.☆57Updated 3 years ago
- Tool to find the real IP behind CDNs/WAFs like cloudflare using passive recon by retrieving the favicon hash. For the same hash value, al…☆176Updated 4 years ago
- Pentest stuff☆49Updated last year
- A shell script to grab subdomains from https://crt.sh, and probe for working http and https servers with @tomnomnom's tool https://github…☆40Updated 3 years ago
- Simple tool to test for SSRF/OOB HTTP Read within the Path of a request☆30Updated 5 years ago
- ☆76Updated 4 years ago
- A Crypto-CTF Assistant For Saving You Time☆17Updated 2 years ago
- R3C0Nizer is the first ever CLI based menu-driven web application B-Tier recon framework.☆151Updated 3 years ago
- golang tool to scan domains or single domains with know security issues against xmlrpc☆60Updated last year
- Web CTF CheatSheet 🐈☆33Updated 5 years ago
- AWS S3 open bucket poc automated script.☆55Updated 3 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆17Updated 4 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆62Updated 3 years ago
- A simple reconnaissance framework for bug bounty hunting☆35Updated 4 years ago
- A list of universities with vulnerability disclosure policies☆48Updated 3 years ago
- NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.☆79Updated 2 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Updated last year
- WILSON Cloud Respwnder is a Web Interaction Logger Sending Out Notifications with the ability to serve custom content in order to appropr…☆51Updated 4 months ago
- Extract Sensitive Keys, Secret, Token Or Interested thing from source☆51Updated 4 years ago
- Host Header Injection Scanner☆44Updated 4 years ago
- bruteforce the admin panel☆14Updated 6 years ago
- Collection of content discovery wordlists in one wordlist.☆37Updated 3 years ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆97Updated 3 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Updated 4 years ago