scumdestroy / warlusts
If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've earned it.
☆37Updated 9 months ago
Alternatives and similar repositories for warlusts:
Users that are interested in warlusts are comparing it to the libraries listed below
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆11Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆51Updated 10 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- Find host header injections and perform Host Header attacks with other kind of bugs like web cache poisoning☆47Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆25Updated 4 months ago
- ☆71Updated 8 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆37Updated 4 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆31Updated last year
- Rockyou for web fuzzing☆14Updated 2 years ago
- Filter URLs to save your time.☆59Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆17Updated 7 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- ☆42Updated last year
- ☆43Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated 11 months ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆19Updated 11 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated last year
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆15Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆38Updated last year
- FireHawk: The Elite Firebase Security Testing Utility☆18Updated 8 months ago
- My personal collection of nuclei templates made for fuzzing.☆27Updated 4 months ago
- This tool allows you to find ssti vulnerability with ease!☆20Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated this week
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆39Updated 2 months ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆23Updated 2 years ago
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆37Updated last year
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆14Updated last month
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated last year