sorokinpf / cth_wordlistsLinks
Various wordlists for bruteforce
☆35Updated 4 years ago
Alternatives and similar repositories for cth_wordlists
Users that are interested in cth_wordlists are comparing it to the libraries listed below
Sorting:
- Python Script for Telegram Bot is specially built for pentest & bug bounty. It's like a telegram shell.☆56Updated 8 months ago
- Find sensitive information using dorks from different search-engines.☆92Updated last year
- 1C RAS Offensive Security Tool☆28Updated 2 years ago
- Serpscan is a powerfull php script designed to allow you to leverage the power of dorking straight from the comfort of your command line.☆70Updated 4 years ago
- A one liner Bash command which finds CORS in every possible endpoint.☆149Updated 5 years ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Updated 3 years ago
- A tool to discover and exploit Nginx alias traversal misconfiguration, the tool can bruteforce the URL path recursively to find out hidde…☆129Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Chrome and Firefox extension that lists Amazon S3 Buckets while browsing☆131Updated 4 months ago
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆55Updated 11 months ago
- ☆67Updated 2 years ago
- Google IP Search Engine☆166Updated 3 years ago
- Robust and blazing fast open-redirect vulnerability scanner with ability of recursevely crawling all of web-forms, entry points, or links…☆42Updated 3 years ago
- Simple fork from degoogle original project with bug hunting purposes☆90Updated 3 years ago
- ☆76Updated 3 weeks ago
- Useful Github Dorks for BugBounty -☆68Updated 3 years ago
- ☆54Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆66Updated 7 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- A burp suite extension that reviews backup, old, temporary and unreferenced files on web server for sensitive information (OWASP WSTG-CON…☆163Updated last year
- Filter URLs to save your time.☆60Updated 3 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated last month
- Bundle of common passwords targeting RUSSIAN-speaking audience (parsed from big data leaks)☆106Updated 6 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆57Updated last year
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆82Updated 3 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆61Updated 3 years ago
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆92Updated 2 years ago