pry0cc / relevant-wordlist
A wordlist that is kept up to date with the latest headlines to provide relevant words to human society
☆119Updated 2 years ago
Alternatives and similar repositories for relevant-wordlist:
Users that are interested in relevant-wordlist are comparing it to the libraries listed below
- Find the remote website version based on a git repository☆125Updated 3 years ago
- Search for vulnerabilities and exposures while filtering based on age, keywords, and other parameters.☆123Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆95Updated 2 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆58Updated 2 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆101Updated last year
- ASN reconnaissance script☆124Updated last year
- FockCache - Minimalized Test Cache Poisoning☆110Updated 4 years ago
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆140Updated last year
- A simple remote scanner for Atlassian Jira☆120Updated 2 years ago
- Tools to assess the DNS security of web applications☆127Updated 2 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- Target practice for ffuf☆61Updated 3 years ago
- Pentesting/Bugbounty Dockerfiles.☆175Updated 3 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆130Updated 3 years ago
- ☆76Updated 4 years ago
- ☆149Updated last year
- Weaponizing Live CT logs for automated monitoring of assets☆132Updated 3 years ago
- Browser extension that extracts users from LinkedIn company pages☆156Updated last year
- ☆147Updated 2 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆180Updated 2 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆118Updated 2 years ago
- A natural evolution of Burp Suite's Repeater tool☆92Updated last year
- Turns any junk text into a usable wordlist for brute-forcing.☆218Updated 10 months ago
- Clientside vulnerability / reflected xss fuzzer☆149Updated last year
- A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate☆205Updated 7 months ago