ninjhacks / unjaLinks
Fetch & Filter Known URLs
☆15Updated 2 years ago
Alternatives and similar repositories for unja
Users that are interested in unja are comparing it to the libraries listed below
Sorting:
- Quick tool to create custom wordlists like how fuzzers work☆10Updated last year
- Automate bug bounty recon using bash alias☆14Updated 10 months ago
- Generating Sub-Sub-Subdomain + validating all of them☆10Updated 2 years ago
- ☆21Updated 4 years ago
- Rockyou for web fuzzing☆14Updated 3 years ago
- Automate your subdomain enumeration, subdomain takeover, management, nuclei, etc. in one go.☆10Updated 3 years ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last year
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆13Updated last year
- All in one subdomain Enumeration tool☆22Updated 2 years ago
- This tool allows you to find ssti vulnerability with ease!☆20Updated 2 years ago
- ☆15Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆22Updated 2 years ago
- ☆21Updated 2 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated last month
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Updated 4 years ago
- ☆21Updated 2 years ago
- Automated Recon Tool Installer☆16Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- ☆13Updated 2 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆9Updated 3 years ago
- collection of various grep patterns collected from tomnomnom/gf and other places☆22Updated 4 years ago
- A Collection of Wordlists for Penetration Testing☆16Updated 6 months ago
- Xss payload for bypassing waf☆16Updated 5 years ago
- simple bash script to earn bounties☆35Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Extract endpoints from source files.☆22Updated 2 years ago
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 7 months ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 3 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- Filter URLs to save your time.☆60Updated 2 years ago