swisskyrepo / jsleak
Upgrading jsleak with a CI/CD and new rules
☆15Updated last year
Alternatives and similar repositories for jsleak:
Users that are interested in jsleak are comparing it to the libraries listed below
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- Source of swisskyrepo.github.io - Public☆22Updated 5 months ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 2 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆20Updated 2 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆15Updated 2 years ago
- Burp or Burp Suite is a set of tools used for penetration testing of web applications. It is developed by the company named Portswigger.☆17Updated 3 months ago
- ☆9Updated 2 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆14Updated 3 years ago
- A collection of hacks and one-off scripts☆10Updated 4 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Updated 5 years ago
- Rockyou for web fuzzing☆14Updated 3 years ago
- My personal repository☆12Updated 4 months ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- Better Google Dorking with Dorker.☆32Updated 2 years ago
- Advance Google Dorker and Vulnerability Scanner☆48Updated 6 years ago
- Proof of concept denial of service over TOR stress test tool☆40Updated 6 years ago
- Google Custom Search Engines for searching in code repositories☆33Updated 11 months ago
- Intelligence gathering framework☆14Updated 9 years ago
- In-depth Attack Surface Mapping and Asset Discovery☆12Updated 4 years ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've…☆40Updated 11 months ago
- PhotOSINT is an OSINT chrome extension for images and photos. It scans each webpage for images with EXIF data, while the user is browsing…☆59Updated 3 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Updated last year
- Subdomain crawler with wordlist using python☆12Updated 4 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆38Updated 6 months ago
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆78Updated 2 years ago
- 🗄️💧 Find exposed and unsecured databases from a list of hosts. 🗄️💧☆11Updated 3 years ago