scumdestroy / warlustsLinks
If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've earned it.
☆45Updated this week
Alternatives and similar repositories for warlusts
Users that are interested in warlusts are comparing it to the libraries listed below
Sorting:
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 9 months ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆11Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- FireHawk: The Elite Firebase Security Testing Utility☆21Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Filter URLs to save your time.☆60Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last year
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated last month
- Chrome extension tool for OSINT & Recon☆53Updated last year
- ☆18Updated last year
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆17Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Rockyou for web fuzzing☆14Updated 3 years ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆28Updated 7 months ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- https://www.nu11secur1ty.com☆23Updated last month
- Find secrets and passwords in container images and file systems☆14Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆42Updated last month
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 4 months ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆26Updated 9 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- xdebug 2.5.5 RCE exploit☆31Updated 5 months ago
- A Python based scanner uses shodan-internetdb to scan the IP.☆31Updated 3 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆22Updated 2 years ago