☆28Apr 3, 2021Updated 4 years ago
Alternatives and similar repositories for shades
Users that are interested in shades are comparing it to the libraries listed below
Sorting:
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- bug bounty automation☆13Jul 2, 2021Updated 4 years ago
- Exploit Android MSM8974 Chipset☆13Aug 20, 2015Updated 10 years ago
- Bash script to extract data from the Waybackmachine☆11Mar 15, 2021Updated 4 years ago
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- All-in-One WP Migration-Backup-Finder☆15Nov 5, 2025Updated 4 months ago
- Stuff that doesn't deserves its own repository.☆357Aug 9, 2025Updated 6 months ago
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection☆13Jul 24, 2022Updated 3 years ago
- assess pronounciblity of text☆37Jun 20, 2021Updated 4 years ago
- find hardcoded strings from source code☆285Feb 3, 2022Updated 4 years ago
- Wireless Pentest☆18Apr 5, 2018Updated 7 years ago
- HTML form parser for humans.☆81May 15, 2020Updated 5 years ago
- Anti-Automation System☆130Mar 18, 2021Updated 4 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- DNS caching for humans☆96Dec 9, 2021Updated 4 years ago
- Dump all available paths and/or endpoints on WADL file.☆98Nov 24, 2025Updated 3 months ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- Fast, indexed regexp search over large file trees☆23Dec 5, 2019Updated 6 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Adobe Experience Manager (AEM) hacking toolkit☆107Sep 26, 2025Updated 5 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆42Jun 12, 2025Updated 8 months ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆56Oct 6, 2020Updated 5 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 2 years ago
- Poc Collected for study and develop☆30Jul 2, 2020Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- A tool for manipulating Call of Duty savegames.☆11May 7, 2017Updated 8 years ago
- ☆10Feb 27, 2026Updated last week