s0md3v / shadesView external linksLinks
☆28Apr 3, 2021Updated 4 years ago
Alternatives and similar repositories for shades
Users that are interested in shades are comparing it to the libraries listed below
Sorting:
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- Exploit Android MSM8974 Chipset☆13Aug 20, 2015Updated 10 years ago
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- SAP penetration testing Web and network cheatsheet☆17May 15, 2022Updated 3 years ago
- All-in-One WP Migration-Backup-Finder☆15Nov 5, 2025Updated 3 months ago
- Stuff that doesn't deserves its own repository.☆355Aug 9, 2025Updated 6 months ago
- dockerfiles☆14Jan 7, 2024Updated 2 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 6 years ago
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection☆13Jul 24, 2022Updated 3 years ago
- assess pronounciblity of text☆37Jun 20, 2021Updated 4 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 5 years ago
- find hardcoded strings from source code☆284Feb 3, 2022Updated 4 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- HTML form parser for humans.☆81May 15, 2020Updated 5 years ago
- Google auto-complete wrapper☆82Jun 26, 2025Updated 7 months ago
- Anti-Automation System☆130Mar 18, 2021Updated 4 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- Dump all available paths and/or endpoints on WADL file.☆98Nov 24, 2025Updated 2 months ago
- AWS,AZURE,GOOGLE CLOUD IP CIDRS☆50Feb 14, 2022Updated 4 years ago
- Fast, indexed regexp search over large file trees☆23Dec 5, 2019Updated 6 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 3 years ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆42Jun 12, 2025Updated 8 months ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆58Oct 6, 2020Updated 5 years ago
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆43Dec 19, 2025Updated last month
- ☆27Jul 30, 2021Updated 4 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- Poc Collected for study and develop☆30Jul 2, 2020Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 2 years ago
- It's a simple tool for test vulnerability shellshock☆119Mar 18, 2021Updated 4 years ago