☆25Mar 5, 2023Updated 3 years ago
Alternatives and similar repositories for ParamAngler
Users that are interested in ParamAngler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- ☆15May 6, 2023Updated 2 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- ☆11Apr 18, 2022Updated 3 years ago
- Some of the gf patterns which i use☆44Jan 19, 2022Updated 4 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- Exploiting XSS with Javascript/JPEG Polyglot (by @medusa_0xf)☆21Apr 8, 2022Updated 4 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- ☆159Mar 23, 2023Updated 3 years ago
- Config files for my GitHub profile.☆13Oct 9, 2022Updated 3 years ago
- Tool to hack Graphql☆15Oct 17, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- ☆10Jan 25, 2023Updated 3 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 8 months ago
- ☆15Apr 5, 2023Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 5 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- ☆18Apr 3, 2023Updated 3 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 11 months ago
- XSS Finder Via SSTI☆56Sep 14, 2023Updated 2 years ago
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- ☆14Nov 30, 2023Updated 2 years ago
- Bug Bounty & Other Stuff☆58Dec 16, 2021Updated 4 years ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- ☆66Jan 14, 2023Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago