tomikoski / common-listsLinks
Misc stuff from internet
☆11Updated last month
Alternatives and similar repositories for common-lists
Users that are interested in common-lists are comparing it to the libraries listed below
Sorting:
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 10 months ago
- S3 bucket enumerator☆30Updated 6 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- Ffuf output browser☆40Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Related subdomains finder☆29Updated 3 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- ☆21Updated 8 years ago
- ☆15Updated 2 years ago
- ☆27Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- HTTP requests of FrontPage expolit☆26Updated 12 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- ☆46Updated last month
- ☆32Updated last year
- A script used to query the dehashed API and filter for more useful results☆17Updated 4 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Penetration Testing & Red Team tools & scripts☆12Updated 2 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated 10 months ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Updated 3 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆19Updated 5 years ago