sickcodes / security
Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.
☆87Updated 2 years ago
Alternatives and similar repositories for security:
Users that are interested in security are comparing it to the libraries listed below
- Bypassing AWS WAF using a single ';'☆40Updated 6 years ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆26Updated last year
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Personal Collection of Awesome Google Dorks☆29Updated 5 years ago
- Reconstruct javascript from a sourcemap in bash☆38Updated 3 years ago
- Fast and passive subdomain enumeration.☆16Updated 2 years ago
- A list of universities with vulnerability disclosure policies☆12Updated 4 years ago
- Web crawler and downloader based on GNU Wget.☆12Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- multiple password 'asher using Python’s hashlib☆14Updated 3 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago
- The hacker technical cheat sheet☆35Updated 4 months ago
- Scanner For Nginx - Remote Integer Overflow Vulnerability☆37Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 7 years ago
- The mitmproxy website, https://mitmproxy.org/.☆15Updated last month
- Differential Fuzzer to hunt for logic bugs on Perl Modules☆25Updated 5 months ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- Search .git folders for emails and URL's that should otherwise be hidden☆29Updated 3 years ago
- NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.☆78Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- ☆17Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- A command based package for simple display of statistics☆21Updated 2 months ago
- ☆12Updated 2 years ago
- WebHook for Red Team☆24Updated 3 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 3 years ago