redhotchilihacker1 / MergenLinks
☆10Updated last year
Alternatives and similar repositories for Mergen
Users that are interested in Mergen are comparing it to the libraries listed below
Sorting:
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆37Updated last year
- ☆12Updated 2 years ago
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆25Updated 2 months ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆57Updated 3 years ago
- SSLPinDetect is a tool for analyzing Android APKs to detect SSL pinning implementations by scanning for known patterns in decompiled code…☆26Updated 5 months ago
- ☆31Updated 4 months ago
- ☆18Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 2 weeks ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆40Updated 2 years ago
- A tool for listing and extracting installed Android APKs and decrypted iOS IPAs (plus app storage) from rooted or jailbroken devices.☆32Updated 3 months ago
- ☆29Updated 4 years ago
- Web Crawler for Identifying Entry Points☆11Updated last year
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆98Updated last month
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆18Updated last year
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆27Updated 9 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- A tool for Subdomain takeovers detection☆26Updated 2 years ago
- A solid recon tool I use personally.☆30Updated 2 years ago
- Tools for bug bounty☆28Updated last month
- A tool for inspecting and analyzing mobile application storage files.☆46Updated 3 months ago
- Pentest Checklists☆18Updated 5 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago
- Automated Subdomain Enumeration and Scanning Tool☆116Updated last year
- ☆92Updated 2 years ago
- ☆65Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆96Updated 7 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- Template used for my OSCP exam.☆30Updated 3 years ago
- ☆46Updated 5 months ago