sleepyeinstein / lemma
Remote CLI tools at your fingertips
☆83Updated 9 months ago
Alternatives and similar repositories for lemma:
Users that are interested in lemma are comparing it to the libraries listed below
- ☆43Updated 4 months ago
- ☆189Updated 9 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆143Updated last week
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆172Updated 7 months ago
- Gather results of dorks across a number of search engines☆118Updated 2 weeks ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆134Updated 4 months ago
- ☆171Updated 2 months ago
- ☆133Updated 3 years ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆136Updated 7 months ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆139Updated 10 months ago
- ☆154Updated 2 years ago
- ☆31Updated last year
- ☆106Updated last year
- Custom scan profiles for use with Burp Suite Pro☆142Updated last year
- Finds graphql queries in javascript files☆61Updated 11 months ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆138Updated last year
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.☆63Updated last month
- ☆102Updated 7 months ago
- ai-based domain name generation☆90Updated 3 months ago
- unleashed ffuf☆112Updated 10 months ago
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆89Updated 2 months ago
- Chrome extension for automating CSPT discovery☆81Updated 2 weeks ago
- ☆63Updated last year
- GQLSpection - parses GraphQL introspection schema and generates possible queries☆84Updated 2 months ago
- ☆95Updated 2 years ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆36Updated 9 months ago
- ☆20Updated last year
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆36Updated 7 months ago
- ☆69Updated 7 months ago
- 🛠️ Workflows created by the community☆65Updated last month