Scripts to automate RECON process
☆11Aug 31, 2025Updated 6 months ago
Alternatives and similar repositories for SubMagic
Users that are interested in SubMagic are comparing it to the libraries listed below
Sorting:
- ☆10Aug 28, 2020Updated 5 years ago
- Highly recommended dorks for bug bounty☆19Oct 17, 2021Updated 4 years ago
- ☆11Apr 21, 2022Updated 3 years ago
- HTTP Headers Security Cheat Sheet☆13Sep 25, 2021Updated 4 years ago
- Looper using wad.js☆14Mar 2, 2023Updated 3 years ago
- Este script en bash te otorgará opciones para personalizar un entorno de trabajo mas cómodo para trabajar con mayor rapidez☆13Oct 27, 2024Updated last year
- A Teensy 4 drone synth☆12Jun 9, 2025Updated 9 months ago
- ☆13Jun 14, 2023Updated 2 years ago
- ☆11May 15, 2020Updated 5 years ago
- A tool to run a command when the target of a symlink changes☆16Apr 28, 2016Updated 9 years ago
- Document created to serve as a first step to learn about blockchain and smart contract security.☆19Sep 20, 2021Updated 4 years ago
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- yoshimi soft synth for web browsers☆15Oct 2, 2019Updated 6 years ago
- ☆22Jul 26, 2024Updated last year
- An entry level resource to learning bug bounty.☆28Apr 11, 2018Updated 7 years ago
- Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as se…☆13Oct 29, 2019Updated 6 years ago
- Administration and troubleshooting tools inside a docker container☆10May 2, 2023Updated 2 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.☆11Dec 14, 2025Updated 3 months ago
- A shell script for running lightning talks with a cow as a compere.☆15Jun 5, 2020Updated 5 years ago
- A small wifi penetration testing tool-kit☆11Jul 21, 2023Updated 2 years ago
- ☆16May 3, 2021Updated 4 years ago
- Personal Notes.☆11Jun 2, 2018Updated 7 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- Trying to make automated recon for bug bounties☆255May 3, 2021Updated 4 years ago
- iPlug2 website☆11Jan 3, 2026Updated 2 months ago
- Etherpad: real-time collaborative document editor☆10Mar 30, 2020Updated 5 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- A wordlist for brute forcing directories / files☆10Jul 7, 2015Updated 10 years ago
- A simple Python class for running multiple URL fetches in parallel☆40Jun 25, 2011Updated 14 years ago
- API research and learning☆12May 22, 2019Updated 6 years ago
- ☆11Aug 26, 2023Updated 2 years ago
- Samples for cross chain transfer between BNB Beacon Chain and BNB Smart Chain☆19Oct 30, 2023Updated 2 years ago
- Webaudio event scheduler☆20Oct 25, 2025Updated 4 months ago
- CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to …☆12Jan 1, 2024Updated 2 years ago
- A MIDI controlled subtractive synthesiser built using the JUCE audio application framework and Maximillian audio synthesis and signal pro…☆12Oct 24, 2020Updated 5 years ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆18Dec 28, 2017Updated 8 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- Serverless Workshop☆16Dec 8, 2022Updated 3 years ago