Inject different payloads in the log of your target
☆18Apr 3, 2022Updated 3 years ago
Alternatives and similar repositories for Log-Venom
Users that are interested in Log-Venom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jun 10, 2023Updated 2 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 3 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- Bug Bounty & Other Stuff☆58Dec 16, 2021Updated 4 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Python based Discord bot Which allows you to run tools like nmap and amass from discord☆27Oct 23, 2022Updated 3 years ago
- Locally scan all the repositories of a github organization☆33Jul 20, 2025Updated 8 months ago
- ☆12Aug 1, 2022Updated 3 years ago
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago
- GoWC - Wildcard cleaner for MassDNS☆24Jun 10, 2022Updated 3 years ago
- ☆30Oct 21, 2021Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Reversing Citrix Gateway for XSS☆17Jul 3, 2023Updated 2 years ago
- You can find hardcoded Api-Key,Secret,Token Etc..☆77Sep 3, 2022Updated 3 years ago
- OWASP ZAP addon for finding vulnerabilities in JWT Implementations☆35Mar 3, 2025Updated last year
- SSL/TLS Certificate Checker - A Python script to validate SSL/TLS certificates for common misconfigurations and output the results in JSO…☆17Sep 27, 2023Updated 2 years ago
- This is a fun application of image processing which enables you to experience the magic of an invisibility cloak. Let's make our childhoo…☆12Jun 5, 2021Updated 4 years ago
- Authorization-Nuclei-Templates☆39Sep 16, 2024Updated last year
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆61Sep 8, 2025Updated 6 months ago
- ☆96Oct 1, 2021Updated 4 years ago
- Correlated injection proxy tool for XSS Hunter☆259Dec 26, 2022Updated 3 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆41Feb 4, 2023Updated 3 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- An Automated Framework for End-to-End Blind XSS Detection and Reporting☆16Jan 23, 2026Updated 2 months ago
- WebSocket Connection Smuggler☆47Sep 30, 2022Updated 3 years ago
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆58Jul 26, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆15Nov 19, 2023Updated 2 years ago
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- ☆11May 15, 2020Updated 5 years ago
- ☆11May 28, 2020Updated 5 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago