rxerium / CVE-2025-68613Links
Detection for CVE-2025-68613
☆27Updated this week
Alternatives and similar repositories for CVE-2025-68613
Users that are interested in CVE-2025-68613 are comparing it to the libraries listed below
Sorting:
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆466Updated 3 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆227Updated 8 months ago
- Automation tool to testing and confirm the xss vulnerability.☆301Updated 5 months ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆818Updated last week
- ☆262Updated 2 weeks ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆384Updated this week
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆332Updated 3 months ago
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆290Updated last month
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆229Updated 8 months ago
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆303Updated this week
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆240Updated last year
- BrutDroid - Android Studio Pentest Automator: Streamline mobile pentesting with automated emulator rooting, Frida, and Burp Suite integra…☆525Updated 5 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆387Updated last month
- ☆88Updated 3 months ago
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆642Updated this week
- Nuclei-AI-Prompts☆347Updated 6 months ago
- ShodanX is a tool to gather information of targets using shodan dorks⚡.☆454Updated 7 months ago
- ☆161Updated last week
- ☆217Updated 2 months ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆308Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆263Updated 5 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆164Updated 7 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆256Updated last year
- Intelligent web vulnerability analysis suite leveraging Generative AI for developers, pentesters, and security researchers.☆124Updated 2 months ago
- Subdomain Enumerator and Simple Crawler☆274Updated this week
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆211Updated 3 months ago
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆336Updated 9 months ago
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆224Updated 3 weeks ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆243Updated last week
- A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc☆102Updated 9 months ago