Wordlists for content discovery with special words in different languages
☆15Jan 17, 2025Updated last year
Alternatives and similar repositories for Language-Dirbusting-Lists
Users that are interested in Language-Dirbusting-Lists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Switch between two running operating systems without losing their state.☆58Jan 2, 2026Updated 3 months ago
- PyTorch Implementation for the paper "Let Me Help You! Neuro-Symbolic Short-Context Action Anticipation" accepted to RA-L'24.☆12Nov 27, 2024Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnel☆41Feb 15, 2026Updated last month
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- 📦 frida-java-crypto-spy 🕵️♂️ A Frida script to hook and log Java Cipher operations (init, update, doFinal, and updateAAD) in Android a…☆15Apr 11, 2025Updated last year
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 6 years ago
- ☆14Feb 25, 2025Updated last year
- Webshell with the newest, easiest, and shortest code and technique.☆10Oct 23, 2021Updated 4 years ago
- Allows you to emulate Android native libraries, based on MicroDbg☆21Feb 7, 2025Updated last year
- ☆91Mar 17, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- ☆19Nov 28, 2024Updated last year
- Hello Hackers ! , Shigaraki tool is all in one for finding specially admin panels , login panels from all subdomains .☆15Jul 1, 2025Updated 9 months ago
- List of fresh and validated DNS resolvers updated every 12h.☆24Apr 5, 2026Updated last week
- Minimalist library for LLM usage☆13Sep 7, 2025Updated 7 months ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- ☆18Aug 14, 2023Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 2 months ago
- ☆72Mar 8, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- NoC simulation using gem5 (a simple tul)☆14Mar 23, 2024Updated 2 years ago
- ☆15Mar 21, 2025Updated last year
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Apr 11, 2024Updated 2 years ago
- HTML Smuggling with Web Assembly☆72Feb 20, 2024Updated 2 years ago
- An application for analysing crime and predicting them in a particular area by the use of data visualization☆13Nov 6, 2022Updated 3 years ago
- Displays a list of open listening sockets. It is a minimal alternative to ss or netstat.☆37Jan 10, 2026Updated 3 months ago
- Vector-Rat is a powerful remote access tool designed specifically for Windows. It allows seamless control and management of any device re…☆20Apr 6, 2025Updated last year
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆57Jan 14, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆35Dec 8, 2021Updated 4 years ago
- ☆19Apr 27, 2025Updated 11 months ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated 2 years ago
- ☆16Jan 10, 2025Updated last year
- ☆22Nov 11, 2024Updated last year
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆43Apr 5, 2026Updated last week
- Contains all code that i wrote when I studied at ITMO University☆15Jul 7, 2022Updated 3 years ago