regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper
☆12Jun 8, 2024Updated last year
Alternatives and similar repositories for regexHunter
Users that are interested in regexHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 蓝牙安全检测项目☆10Jan 31, 2023Updated 3 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Vulnerability disclosure policies in the US Government's executive branch☆39Mar 28, 2023Updated 3 years ago
- Provides temporary admin access for a standard user via Jamf Self Service☆10Oct 25, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- ☆14May 9, 2023Updated 2 years ago
- AI Powered penetration testing Platform for offensive security research☆71Updated this week
- Script that download 37+ open source nuclei templates☆45Sep 2, 2022Updated 3 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Quick commands for pentesting/No typing!☆18Nov 21, 2023Updated 2 years ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆50Nov 4, 2022Updated 3 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆10Feb 13, 2017Updated 9 years ago
- Tools to gather subdomains from Bug Bounty programs☆65Mar 29, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Monitor websites for changes☆29Apr 20, 2026Updated last week
- ☆10Dec 19, 2024Updated last year
- ☆14Nov 8, 2024Updated last year
- Educational tool for simulating Instagram login and 2FA mechanisms. Designed for ethical hacking and cybersecurity training.☆21Jul 29, 2025Updated 8 months ago
- TeleStrike is a red team utility designed for adversary simulation and security auditing of Telegram accounts. Built for educational and …☆45Aug 1, 2025Updated 8 months ago
- Upgrading jsleak with a CI/CD and new rules☆17May 6, 2023Updated 2 years ago
- Access the query parameters of a URI, just like $_GET in PHP.☆18Jan 12, 2026Updated 3 months ago
- ☆15Mar 17, 2025Updated last year
- Offensive web scanner: crawling, XSS, SQLi, headers and WAF bypass☆13Apr 20, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Angular UI component that represents an international payment card☆10Jan 7, 2024Updated 2 years ago
- Useful scripts for tampermonkey that I used during bug hunting. Will be updated "au fil de l'eau"☆17Jun 2, 2025Updated 10 months ago
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search qu…☆34Mar 4, 2026Updated last month
- A custom Cards Against Humanity generator☆13May 16, 2024Updated last year
- A tool to get anyone's IP, device details and exact location on google maps along with latitude and longitude by sharing a link with the …☆21May 4, 2020Updated 5 years ago
- ☆57Oct 29, 2020Updated 5 years ago
- A script for installing custom patches in Ubuntu Touch devices.☆11Oct 7, 2025Updated 6 months ago
- Xninjaz is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Loc…☆11Oct 16, 2025Updated 6 months ago
- Blockchain web page clone - I cloned the blockchain website to combine my html and css information☆10Mar 3, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 9 months ago
- DepthSearch is a deep web OSINT tool that enables powerful, anonymous searches across deep web search engines. It features proxy support,…☆25Oct 26, 2024Updated last year
- ☆20Feb 27, 2025Updated last year
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- A server vulnerable to XXE that can be used to test payloads using the xxer tool.☆26Mar 29, 2018Updated 8 years ago
- deface-X is an automatic deface tool used to inject a website☆13Oct 16, 2025Updated 6 months ago