Tests URLs for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), and Cross Site Scripting (XSS), Server Side Template Injection (SSTI), and Open Redirects.
☆80Jan 13, 2026Updated 3 months ago
Alternatives and similar repositories for ronin-vulns
Users that are interested in ronin-vulns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Ruby DSL for crafting SQL Injections☆46Jan 12, 2026Updated 3 months ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated 3 months ago
- Get list of subsidiaries for a selected company☆32Dec 21, 2024Updated last year
- A command-line utility for working with URLs.☆10Dec 8, 2025Updated 4 months ago
- Burp Extender, ssrf scanner, 自动扫描ssrf漏洞☆46Mar 31, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2022-22980环境☆14Jul 14, 2022Updated 3 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Mar 24, 2024Updated 2 years ago
- ☆30Jul 14, 2023Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- Fast Web Security Scanner written in Rust based on Lua Scripts☆91Jan 25, 2026Updated 2 months ago
- ☆8Apr 1, 2014Updated 12 years ago
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- A Ruby library and CLI for generating and working with wordlists.☆48Jan 12, 2026Updated 3 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Exploration project to invoke syscalls in arbitrary unix processes with ptrace.☆21Jun 14, 2023Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆239Mar 26, 2026Updated 3 weeks ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 3 months ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆69Nov 20, 2025Updated 4 months ago
- An automation tool to install the most popular tools for bug bounty or pentesting.☆124Dec 29, 2025Updated 3 months ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- ☆66Jan 14, 2023Updated 3 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆61Sep 14, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Apr 18, 2024Updated 2 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆25Jun 25, 2023Updated 2 years ago
- The ronin-rb.dev website☆24Jan 12, 2026Updated 3 months ago
- Static code analyser to find security issues in Rails applications☆68Mar 7, 2026Updated last month
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated last year
- vīlicus is a bug bounty api dashboard☆41Aug 13, 2023Updated 2 years ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Sep 25, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Jul 16, 2023Updated 2 years ago
- Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite☆80Jan 13, 2023Updated 3 years ago
- Smart context-based SSRF vulnerability scanner.☆361May 5, 2022Updated 3 years ago
- Real world bug bounty wordlists☆117Jul 20, 2023Updated 2 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.☆12Feb 1, 2023Updated 3 years ago