thelikes / rejigLinks
Turn your VPS into an attack box
☆35Updated last year
Alternatives and similar repositories for rejig
Users that are interested in rejig are comparing it to the libraries listed below
Sorting:
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Fast Endpoint Scanner☆55Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- ⚡️ Multiple target ZAP Scanning☆103Updated last year
- Validate proxies for specific domain☆36Updated 4 years ago
- Advanced Recon Tool☆26Updated 5 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆59Updated 9 months ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆17Updated 4 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆86Updated 2 years ago
- ☆47Updated 4 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Custom scripts for directory fuzzing, subdomain enumeration, and more.☆43Updated 3 years ago
- Offensive Security recon tool☆92Updated 4 years ago
- A tool to find redirection chains in multiple URLs☆80Updated 8 months ago
- Image Tragick Exploit Tool Using Burp Collaborator☆37Updated last year
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆24Updated 4 years ago
- Python resource library for creating security related tooling☆79Updated last year
- Recon Custom WordList Ganerator☆58Updated 5 years ago
- Wordlists for intelligent directory brute-forcing☆32Updated 3 years ago
- Credentials Checking Framework☆54Updated 2 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- Handy bash and python scripts for bug bounty hunting!☆48Updated 4 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year