Tests URLs for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), and Cross Site Scripting (XSS), Server Side Template Injection (SSTI), and Open Redirects.
☆79Jan 13, 2026Updated 3 months ago
Alternatives and similar repositories for ronin-vulns
Users that are interested in ronin-vulns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Ruby DSL for crafting SQL Injections☆46Jan 12, 2026Updated 3 months ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated 3 months ago
- Get list of subsidiaries for a selected company☆32Dec 21, 2024Updated last year
- Burp Extender, ssrf scanner, 自动扫描ssrf漏洞☆46Mar 31, 2021Updated 5 years ago
- CVE-2022-22980环境☆14Jul 14, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Mar 24, 2024Updated 2 years ago
- ☆30Jul 14, 2023Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆70Sep 20, 2024Updated last year
- Fast Web Security Scanner written in Rust based on Lua Scripts☆92Jan 25, 2026Updated 3 months ago
- A Ruby library and CLI for generating and working with wordlists.☆48Jan 12, 2026Updated 3 months ago
- Exploration project to invoke syscalls in arbitrary unix processes with ptrace.☆21Jun 14, 2023Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆241Apr 20, 2026Updated 2 weeks ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 3 months ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆69Nov 20, 2025Updated 5 months ago
- An automation tool to install the most popular tools for bug bounty or pentesting.☆122Dec 29, 2025Updated 4 months ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- ☆65Jan 14, 2023Updated 3 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆62Sep 14, 2022Updated 3 years ago
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Apr 18, 2024Updated 2 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆25Jun 25, 2023Updated 2 years ago
- The ronin-rb.dev website☆24Jan 12, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Static code analyser to find security issues in Rails applications☆69Mar 7, 2026Updated 2 months ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated last year
- vīlicus is a bug bounty api dashboard☆41Aug 13, 2023Updated 2 years ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Sep 25, 2023Updated 2 years ago
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Jul 16, 2023Updated 2 years ago
- Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite☆79Jan 13, 2023Updated 3 years ago
- Smart context-based SSRF vulnerability scanner.☆361May 5, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Real world bug bounty wordlists☆118Jul 20, 2023Updated 2 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.☆12Feb 1, 2023Updated 3 years ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆91May 2, 2024Updated 2 years ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- A domain specific language for creating composable command line interfaces.☆14Apr 21, 2026Updated 2 weeks ago