Wordlists for content discovery with special words in different languages
☆15Jan 17, 2025Updated last year
Alternatives and similar repositories for Language-Dirbusting-Lists
Users that are interested in Language-Dirbusting-Lists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Apr 23, 2025Updated 11 months ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- Switch between two running operating systems without losing their state.☆58Jan 2, 2026Updated 2 months ago
- PyTorch Implementation for the paper "Let Me Help You! Neuro-Symbolic Short-Context Action Anticipation" accepted to RA-L'24.☆12Nov 27, 2024Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnel☆41Feb 15, 2026Updated last month
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- 📦 frida-java-crypto-spy 🕵️♂️ A Frida script to hook and log Java Cipher operations (init, update, doFinal, and updateAAD) in Android a…☆15Apr 11, 2025Updated 11 months ago
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 5 years ago
- ☆14Feb 25, 2025Updated last year
- Allows you to emulate Android native libraries, based on MicroDbg☆21Feb 7, 2025Updated last year
- ☆91Mar 17, 2025Updated last year
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- ☆38Jun 16, 2025Updated 9 months ago
- List of fresh and validated DNS resolvers updated every 12h.☆24Updated this week
- Minimalist library for LLM usage☆13Sep 7, 2025Updated 6 months ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Simple reverse shell to avoid Windows defender and kaspersky detection☆21Dec 20, 2021Updated 4 years ago
- ☆18Aug 14, 2023Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52May 26, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- ☆17Jun 21, 2024Updated last year
- ☆71Mar 8, 2026Updated 2 weeks ago
- NoC simulation using gem5 (a simple tul)☆14Mar 23, 2024Updated 2 years ago
- ☆15Mar 21, 2025Updated last year
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Apr 11, 2024Updated last year
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated 2 years ago
- An application for analysing crime and predicting them in a particular area by the use of data visualization☆13Nov 6, 2022Updated 3 years ago
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- Medical IOT System Consists of Smart Band, Medical generative QA model, mobile application which facilitate efficient healthcare monitori…☆25Mar 28, 2024Updated last year
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆57Jan 14, 2025Updated last year
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆35Dec 8, 2021Updated 4 years ago
- ☆19Apr 27, 2025Updated 10 months ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated 2 years ago
- ☆17Jan 10, 2025Updated last year
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆42Feb 20, 2026Updated last month