This is a small extension to make graphql readable
☆30Dec 14, 2018Updated 7 years ago
Alternatives and similar repositories for GQL-Helper
Users that are interested in GQL-Helper are comparing it to the libraries listed below
Sorting:
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Jun 14, 2018Updated 7 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆29Oct 18, 2021Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Some random scripts. Just trying to be like the cool kids.☆101Jul 1, 2018Updated 7 years ago
- A tool for fetching archived URLs (to be rewritten in Go).☆41Jul 19, 2018Updated 7 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Apr 19, 2017Updated 8 years ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- Run a docker container include hackazon, apache, and mysql☆16Oct 22, 2022Updated 3 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆104Feb 11, 2019Updated 7 years ago
- ☆32Apr 6, 2021Updated 4 years ago
- BugBounty framework with main function to ORGANIZE data and STEPS. So, you don't get lost in your bug bounty hunting. You can find everyt…☆14Jul 8, 2018Updated 7 years ago
- An Extended, Modulair, Host Discovery Framework☆42Jan 22, 2019Updated 7 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- https://jira.atlassian.com/browse/JRASERVER-69793☆10Sep 16, 2019Updated 6 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- Burp Suite Attack Selector Plugin☆60Nov 23, 2017Updated 8 years ago
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- ☆126Sep 2, 2019Updated 6 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago
- Dashboard containing various recon tools☆14Oct 12, 2017Updated 8 years ago
- A horizontal and vertical web content enumerator☆52Aug 15, 2018Updated 7 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- Broken Link Hijacking Burp Extension☆57Sep 13, 2019Updated 6 years ago
- Scripts for Deploying new server☆49Apr 26, 2025Updated 10 months ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- golang program to send RSS feeds per E-Mail☆10Sep 1, 2025Updated 6 months ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago