This is a small extension to make graphql readable
☆30Dec 14, 2018Updated 7 years ago
Alternatives and similar repositories for GQL-Helper
Users that are interested in GQL-Helper are comparing it to the libraries listed below
Sorting:
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Jun 14, 2018Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Apr 19, 2017Updated 8 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- A tool for fetching archived URLs (to be rewritten in Go).☆41Jul 19, 2018Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆104Feb 11, 2019Updated 7 years ago
- Burp Suite Attack Selector Plugin☆60Nov 23, 2017Updated 8 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- golang program to send RSS feeds per E-Mail☆10Sep 1, 2025Updated 5 months ago
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Jun 5, 2017Updated 8 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- Some random scripts. Just trying to be like the cool kids.☆101Jul 1, 2018Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆29Oct 18, 2021Updated 4 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- Dashboard containing various recon tools☆14Oct 12, 2017Updated 8 years ago
- Proof of Concept's provided by Source Incite☆37Aug 10, 2017Updated 8 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- ☆31Apr 6, 2021Updated 4 years ago
- OpenSSH 7.7 - Username Enumeration☆17Oct 23, 2020Updated 5 years ago
- Useful tips on how to maximize and balance security and privacy on iOS☆12Oct 9, 2018Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago