Various wordlists for bruteforce
☆36Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for cth_wordlists
Users that are interested in cth_wordlists are comparing it to the libraries listed below
Sorting:
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Mar 26, 2022Updated 3 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- ☆12Jan 10, 2025Updated last year
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- Attack on a local network using an ARP vulnerability☆11Jan 12, 2022Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- ☆13Jan 25, 2020Updated 6 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- A repository with my code snippets for research/education purposes.☆53Jul 28, 2023Updated 2 years ago
- List of fresh and validated DNS resolvers updated every 12h.☆24Mar 2, 2026Updated last week
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- HackTheBox High Definition Badge Generator☆28Jul 1, 2019Updated 6 years ago
- NSE Script for GraphQL Introspection Check☆24Jan 9, 2022Updated 4 years ago
- ☆57Mar 25, 2024Updated last year
- ☆11Feb 14, 2023Updated 3 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Mar 6, 2024Updated 2 years ago
- Chart-Of-Wordlist helps to create your own custom wordlist. Also in one repository, you can find a list of awesome wordlist.☆61Mar 29, 2022Updated 3 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 6 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- Play Games on Termux☆29Oct 3, 2024Updated last year
- ☆35Mar 22, 2019Updated 6 years ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆35Feb 4, 2023Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆141Feb 24, 2022Updated 4 years ago
- Dota 2 LUA scripts for umbrella☆12Apr 11, 2019Updated 6 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- VK bot для сноса бесед☆11Feb 7, 2021Updated 5 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- lua scripts for dota2☆10Jul 28, 2019Updated 6 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Dec 25, 2024Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆42Nov 10, 2025Updated 3 months ago
- A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!☆50Feb 1, 2025Updated last year
- A collection of all current guides on the Nintendo switch☆14Jan 15, 2024Updated 2 years ago