sleepyeinstein / lemmaLinks
Remote CLI tools at your fingertips
☆88Updated 10 months ago
Alternatives and similar repositories for lemma
Users that are interested in lemma are comparing it to the libraries listed below
Sorting:
- ☆43Updated 5 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆146Updated last week
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆141Updated last year
- ☆136Updated 3 years ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆137Updated 9 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆169Updated 8 months ago
- ☆122Updated 8 months ago
- Gather results of dorks across a number of search engines☆124Updated 2 months ago
- ☆172Updated 4 months ago
- ☆65Updated last year
- Chrome extension for automating CSPT discovery☆85Updated last week
- ☆108Updated 2 years ago
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆90Updated 3 months ago
- ☆194Updated 11 months ago
- ☆73Updated 9 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆141Updated 6 months ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆141Updated 11 months ago
- Finds graphql queries in javascript files☆62Updated last year
- A path-normalization pentesting tool.☆128Updated last year
- ☆32Updated last year
- ☆155Updated 2 years ago
- ☆103Updated 11 months ago
- Useful configurations for the DomLogger++ extension☆35Updated 9 months ago
- jxscout superpowers JavaScript analysis for security researchers☆163Updated 3 weeks ago
- Custom scan profiles for use with Burp Suite Pro☆144Updated last year
- ai-based domain name generation☆93Updated 4 months ago
- Private Nuclei Templates☆100Updated 4 months ago
- Identify virtual hosts by similarity comparison☆126Updated 10 months ago
- get all nuclei temp from emad shanab repo in one run☆35Updated 2 years ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆37Updated 9 months ago