onhexgroup / Vulnerable-WordPress
The vulnerable version of WordPress that is updated monthly.
☆130Updated 2 months ago
Alternatives and similar repositories for Vulnerable-WordPress:
Users that are interested in Vulnerable-WordPress are comparing it to the libraries listed below
- ☆104Updated last year
- Recon MindMap (RMM)☆155Updated 10 months ago
- Automated Subdomain Enumeration and Scanning Tool☆112Updated last year
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆234Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆148Updated 4 months ago
- Scripts and other stuff.☆133Updated last year
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Updated 7 months ago
- Self-hosted passive subdomain continous monitoring tool.☆160Updated last year
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆72Updated last year
- A Personal Collection of Infosec Dorks☆199Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆76Updated last year
- AI-powered ffuf wrapper☆301Updated 4 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆146Updated 10 months ago
- Docker toolbox for pentest of web based application.☆148Updated last week
- ☆102Updated 8 months ago
- Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite☆77Updated 2 years ago
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆87Updated 3 weeks ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 6 months ago
- Wordlists handcrafted (and automated) with ♥☆215Updated 2 weeks ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆101Updated 8 months ago
- Search for sensitive data in Postman public library.☆203Updated 2 months ago
- ☆147Updated 9 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆150Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆121Updated 2 years ago
- CLI tool to scan URLs for suspicious keywords, extensions, paths, and hidden files.☆44Updated 4 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆109Updated 5 months ago
- ☆137Updated 3 years ago
- A streamlined tool for discovering private TLDs for security research.☆180Updated this week
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 8 months ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 2 months ago