redhotchilihacker1 / Mergen
☆10Updated 8 months ago
Alternatives and similar repositories for Mergen:
Users that are interested in Mergen are comparing it to the libraries listed below
- ☆12Updated 2 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆34Updated 10 months ago
- Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.☆100Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- Reports of cyber threat intelligence☆13Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 2 months ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 2 years ago
- ☆39Updated last month
- ☆93Updated last year
- A passive way to find backups/ sensitive information.☆72Updated 2 months ago
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆55Updated last year
- A tool for Subdomain takeovers detection☆26Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆30Updated last year
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Updated 3 years ago
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆34Updated 6 months ago
- ☆18Updated last year
- ☆11Updated last week
- SSLPinDetect is a tool for analyzing Android APKs to detect SSL pinning implementations by scanning for known patterns in decompiled code…☆19Updated last week
- Testing default web credentials☆33Updated last year
- ☆42Updated last month
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago
- Brute Force subdomains with a list of custom DNS records.☆13Updated 2 years ago
- Pentest automation resources for Burp☆14Updated last year
- Collection of Stuff☆14Updated last year
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Updated last year
- Fuzz every path with goky☆14Updated last year
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆53Updated 5 months ago
- ☆43Updated 2 weeks ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆39Updated last week