thelikes / rejig
Turn your VPS into an attack box
☆34Updated last year
Alternatives and similar repositories for rejig
Users that are interested in rejig are comparing it to the libraries listed below
Sorting:
- Validate proxies for specific domain☆36Updated 3 years ago
- Advanced Recon Tool☆26Updated 4 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆21Updated 4 years ago
- Script Recon Bug Bounty☆10Updated 4 years ago
- Wrapper around LinkFinder to quickly determine whether endpoints have been added/removed to JavaScript files.☆41Updated 5 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆59Updated 5 months ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Reconnaisance Tool☆11Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- Virtual host wordlist☆51Updated 4 years ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- Information-Gathering Shell Script☆30Updated 4 years ago
- Tool to extract & validate google fcm server keys from apks☆28Updated 4 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 2 years ago
- ☆24Updated 4 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated 10 months ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Updated 4 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Extract subdomains from rapiddns.io☆23Updated 2 years ago
- ☆47Updated 4 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Updated 4 years ago
- Finds Directory Listings or open S3 buckets from a list of URLs☆52Updated 3 years ago
- ☆12Updated 4 years ago
- A commandline forced browsing tool for subdomain lists☆9Updated 4 years ago