swisskyrepo / jsleakLinks
Upgrading jsleak with a CI/CD and new rules
☆16Updated 2 years ago
Alternatives and similar repositories for jsleak
Users that are interested in jsleak are comparing it to the libraries listed below
Sorting:
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- My personal repository☆13Updated 2 weeks ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated last year
- Source of swisskyrepo.github.io - Public☆26Updated 5 months ago
- List of Github repositories and articles with list of dorks for different search engines☆32Updated 3 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆17Updated 3 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Updated 3 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Updated 3 years ago
- Find secrets and passwords in container images and file systems☆14Updated 3 years ago
- PhotOSINT is an OSINT chrome extension for images and photos. It scans each webpage for images with EXIF data, while the user is browsing…☆58Updated 4 years ago
- PrivacyNet: Privacy Network☆53Updated last year
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Updated last year
- Fast subdomains enumeration tool for penetration testers☆14Updated 5 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆34Updated 4 years ago
- List of GREP modifications and alternatives for a variety of purposes☆135Updated 3 weeks ago
- An Simple PHP Webshell Manager to bypassed security system☆22Updated last year
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 7 months ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆60Updated last year
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆25Updated last year
- Advance Google Dorker and Vulnerability Scanner☆49Updated 7 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆37Updated 7 years ago
- ☆10Updated 3 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Updated last year
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆66Updated 6 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆53Updated last year
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆61Updated 6 months ago
- Useful Github Dorks for BugBounty -☆68Updated 3 years ago