redhotchilihacker1 / MergenLinks
☆10Updated 11 months ago
Alternatives and similar repositories for Mergen
Users that are interested in Mergen are comparing it to the libraries listed below
Sorting:
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆23Updated 3 weeks ago
- ☆12Updated 2 years ago
- SSLPinDetect is a tool for analyzing Android APKs to detect SSL pinning implementations by scanning for known patterns in decompiled code…☆25Updated 3 months ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆36Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- ☆18Updated 2 years ago
- ☆31Updated 2 months ago
- Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.☆102Updated 2 years ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Updated last year
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆98Updated 5 months ago
- A passive way to find backups/ sensitive information.☆82Updated last month
- A simple plugin to export JS files from one or multiple targets☆43Updated last year
- ☆12Updated 3 years ago
- Web Crawler for Identifying Entry Points☆11Updated last year
- Pentest automation resources for Burp☆14Updated last year
- Template used for my OSCP exam.☆29Updated 2 years ago
- Some of the gf patterns which i use☆43Updated 3 years ago
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆33Updated last year
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆12Updated last year
- IIS shortname scanner + bruteforce☆52Updated last year
- Fuzz every path with goky☆14Updated last year
- A solid recon tool I use personally.☆30Updated 2 years ago
- ☆43Updated 4 months ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆18Updated last year
- ☆29Updated 4 years ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆21Updated 3 months ago
- ☆35Updated 6 months ago
- ☆21Updated 2 years ago
- ☆27Updated 5 years ago