thelikes / rejigLinks
Turn your VPS into an attack box
☆34Updated last year
Alternatives and similar repositories for rejig
Users that are interested in rejig are comparing it to the libraries listed below
Sorting:
- ⚡️ Multiple target ZAP Scanning☆105Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 5 years ago
- Validate proxies for specific domain☆38Updated 4 years ago
- ☆46Updated 4 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- Advanced Recon Tool☆26Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆41Updated 2 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Updated 4 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 3 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆57Updated last year
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated last year
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆86Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- ☆36Updated 11 months ago
- Fast Endpoint Scanner☆55Updated 5 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- Reconness Agents Script☆31Updated 3 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Updated 2 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Updated 5 years ago
- Offensive Security recon tool☆91Updated 4 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- WebSocket Connection Smuggler☆47Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- A tool to find redirection chains in multiple URLs☆79Updated last year
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Updated 5 years ago