The Ultimate Recon Framework
☆11Mar 11, 2026Updated last week
Alternatives and similar repositories for Trishul
Users that are interested in Trishul are comparing it to the libraries listed below
Sorting:
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 7 months ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- This extension provides a central location for viewing all GraphQL requests/responses within a Burp project. It provides a clean UI that …☆15Feb 24, 2022Updated 4 years ago
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- A tun2socks implementation written in Go.☆14Jul 2, 2021Updated 4 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Fast tool to lookup list of IP adresses☆14Oct 5, 2022Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆19Sep 9, 2025Updated 6 months ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- Find and remove metadata from MS doc or docx files in folder☆14Feb 2, 2026Updated last month
- Extract domains/subdomains/FQDNs from files and URLs☆19Jun 30, 2020Updated 5 years ago
- Labs from our workshop "Demystifying the server-side".☆17May 30, 2022Updated 3 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- Test the speed and reliability of a list of DNS servers☆22Dec 9, 2020Updated 5 years ago
- USSD simulator which reads USSD menus via API and displays them in mock phones☆15Jul 1, 2022Updated 3 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.☆35Dec 31, 2025Updated 2 months ago
- Linux / Windows / macOS 跨平台 V2Ray 客户端 | 支持 VMess / VLESS / SSR / Trojan / Trojan-Go / NaiveProxy / HTTP / HTTPS / SOCKS5 | 使用 C++ / Qt 开…☆11Dec 10, 2020Updated 5 years ago
- Wireguard operator☆21Jun 24, 2019Updated 6 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- This project is to simulate the Mobile Phone to do various demos. For now it will only support USSD Messages☆19May 26, 2018Updated 7 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆27Jun 18, 2025Updated 9 months ago
- VMWare vRealize SSRF-CVE-2021-21975☆14Apr 2, 2021Updated 4 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- ☆22Apr 10, 2021Updated 4 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Jan 6, 2021Updated 5 years ago
- ☆16Jul 20, 2020Updated 5 years ago
- Satellite Signal Meter for Enigma based receivers☆26Jun 4, 2020Updated 5 years ago