Inject different payloads in the log of your target
☆18Apr 3, 2022Updated 4 years ago
Alternatives and similar repositories for Log-Venom
Users that are interested in Log-Venom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jun 10, 2023Updated 2 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆68Apr 8, 2022Updated 4 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- Bug Bounty & Other Stuff☆58Dec 16, 2021Updated 4 years ago
- Python based Discord bot Which allows you to run tools like nmap and amass from discord☆28Oct 23, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Locally scan all the repositories of a github organization☆35Jul 20, 2025Updated 9 months ago
- ☆12Aug 1, 2022Updated 3 years ago
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago
- GoWC - Wildcard cleaner for MassDNS☆24Jun 10, 2022Updated 3 years ago
- ☆30Oct 21, 2021Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- Reversing Citrix Gateway for XSS☆17Jul 3, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- You can find hardcoded Api-Key,Secret,Token Etc..☆77Sep 3, 2022Updated 3 years ago
- OWASP ZAP addon for finding vulnerabilities in JWT Implementations☆36Mar 3, 2025Updated last year
- SSL/TLS Certificate Checker - A Python script to validate SSL/TLS certificates for common misconfigurations and output the results in JSO…☆18Sep 27, 2023Updated 2 years ago
- This is a fun application of image processing which enables you to experience the magic of an invisibility cloak. Let's make our childhoo…☆12Jun 5, 2021Updated 4 years ago
- Authorization-Nuclei-Templates☆39Sep 16, 2024Updated last year
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- ☆65Sep 8, 2025Updated 7 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆96Oct 1, 2021Updated 4 years ago
- Correlated injection proxy tool for XSS Hunter☆257Dec 26, 2022Updated 3 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆41Feb 4, 2023Updated 3 years ago
- An Automated Framework for End-to-End Blind XSS Detection and Reporting☆16Jan 23, 2026Updated 3 months ago
- ☆12Feb 18, 2022Updated 4 years ago
- WebSocket Connection Smuggler☆47Sep 30, 2022Updated 3 years ago
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆58Jul 26, 2020Updated 5 years ago
- ☆16Nov 19, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- ☆11May 15, 2020Updated 5 years ago
- ☆11May 28, 2020Updated 5 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 6 years ago
- Wrapper around LinkFinder to quickly determine whether endpoints have been added/removed to JavaScript files.☆41Dec 27, 2019Updated 6 years ago