Inject different payloads in the log of your target
☆18Apr 3, 2022Updated 3 years ago
Alternatives and similar repositories for Log-Venom
Users that are interested in Log-Venom are comparing it to the libraries listed below
Sorting:
- ☆10Jun 10, 2023Updated 2 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- GoWC - Wildcard cleaner for MassDNS☆24Jun 10, 2022Updated 3 years ago
- Locally scan all the repositories of a github organization☆31Jul 20, 2025Updated 7 months ago
- Wrapper for blocksec2go allowing easy hardware-based signing of Ethereum transactions☆12Feb 8, 2023Updated 3 years ago
- Bug Bounty & Other Stuff☆58Dec 16, 2021Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- ☆30Oct 21, 2021Updated 4 years ago
- OWASP ZAP addon for finding vulnerabilities in JWT Implementations☆35Mar 3, 2025Updated last year
- ☆11Apr 22, 2020Updated 5 years ago
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 3 years ago
- ☆59Sep 8, 2025Updated 5 months ago
- You can find hardcoded Api-Key,Secret,Token Etc..☆77Sep 3, 2022Updated 3 years ago
- WebSocket Connection Smuggler☆47Sep 30, 2022Updated 3 years ago
- ☆32Dec 30, 2022Updated 3 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Use mason's rule to simplify signal flow graphs in MATLAB☆11Mar 5, 2020Updated 6 years ago
- ☆96Oct 1, 2021Updated 4 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆13Nov 19, 2025Updated 3 months ago
- ☆12Feb 18, 2022Updated 4 years ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.☆11Dec 14, 2025Updated 2 months ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- Pachyderm/MLeap team up to provide versioned datasets + models☆10Jun 7, 2017Updated 8 years ago
- Solidity smart contract for atomic swaps.☆10Oct 31, 2022Updated 3 years ago
- Reverse HTTP proxy server that requires Yubikey OTP authentication to allow proxying.☆10Jul 24, 2017Updated 8 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year