s0md3v / shades
☆28Updated 4 years ago
Alternatives and similar repositories for shades:
Users that are interested in shades are comparing it to the libraries listed below
- A custom script I created because I got tired of installing my tools manually!☆13Updated 5 months ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- Some Templates for Bash Scripting☆16Updated 2 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆25Updated last week
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- ☆20Updated 3 years ago
- Pipe different tools with google dork Scanner☆56Updated 4 years ago
- little helping scripts that I use daily☆11Updated 3 years ago
- A collection of simple tools and poc-builders☆39Updated last month
- A simple reconnaissance framework for bug bounty hunting☆35Updated 4 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- A python library to automate time-based blind SQL injection☆50Updated 5 years ago
- Automated Recon Framework☆24Updated 4 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆36Updated 5 years ago
- Bug bounty bot for channel☆16Updated 2 years ago
- Http/Https multi threading checker☆9Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- Handy bash and python scripts for bug bounty hunting!☆47Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Updated 2 years ago
- use at your own risk☆37Updated 5 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆25Updated last year
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 3 years ago
- Find endpoints in archived versions of robots.txt☆14Updated 5 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 5 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆22Updated 4 years ago