s0md3v / shadesLinks
☆28Updated 4 years ago
Alternatives and similar repositories for shades
Users that are interested in shades are comparing it to the libraries listed below
Sorting:
- A custom script I created because I got tired of installing my tools manually!☆13Updated 11 months ago
- DNS hijacking via dead records automation tool☆53Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- ☆64Updated last year
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Updated 3 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆63Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆17Updated 4 years ago
- Turn your VPS into an attack box☆35Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Some Templates for Bash Scripting☆16Updated 3 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆59Updated 11 months ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆86Updated 2 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆27Updated 3 weeks ago
- WebSocket Connection Smuggler☆47Updated 3 years ago
- use at your own risk☆37Updated 5 years ago
- REST API backend for Reconmap☆47Updated last week
- A python library to automate time-based blind SQL injection☆49Updated 6 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- ☆38Updated 4 years ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Updated 5 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago
- Credentials Checking Framework☆54Updated 2 years ago
- Fast Endpoint Scanner☆55Updated 4 years ago
- ☆19Updated 4 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- stdin writes to slack☆14Updated 5 years ago