shr3ddersec / WriteupsLinks
Random Tips and Writeups.
☆15Updated 6 years ago
Alternatives and similar repositories for Writeups
Users that are interested in Writeups are comparing it to the libraries listed below
Sorting:
- Collection of scripts that I created to make my life easier.☆12Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- Everything about xss protection technology☆14Updated 6 years ago
- visually see issues with supported cipher suites☆17Updated last year
- ☆17Updated 2 years ago
- ☆18Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- ☆18Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- Magento Security Scanner☆13Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆13Updated 3 years ago
- Exactly what it sounds like, which is something rad☆23Updated 3 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Updated 4 years ago
- ☆11Updated 2 years ago
- ☆16Updated 7 years ago
- buffer overflow examples☆22Updated 8 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Updated 2 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Updated 7 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated last year