Archive of Potential Insider Threats
☆152Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for insiders
Users that are interested in insiders are comparing it to the libraries listed below
Sorting:
- Filter and enrich a list of subdomains by level☆210Sep 25, 2023Updated 2 years ago
- Combine words from two wordlist files and concatenate them with an optional delimiter☆38Sep 25, 2023Updated 2 years ago
- Monitoring the Cloud Landscape☆92Updated this week
- List all public repositories for (valid) GitHub usernames☆76Sep 25, 2023Updated 2 years ago
- Make URL path combinations using a wordlist☆169Sep 25, 2023Updated 2 years ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆273Sep 25, 2023Updated 2 years ago
- security.txt collection of most popular world-wide domains☆56Sep 25, 2023Updated 2 years ago
- Find CVE PoCs on GitHub☆161Aug 1, 2025Updated 7 months ago
- Asset inventory of over 800 public bug bounty programs.☆1,519Feb 14, 2025Updated last year
- Tool to extract & validate google fcm server keys from apks☆29Jan 20, 2021Updated 5 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- Find endpoints on GitHub.☆214Mar 28, 2023Updated 2 years ago
- ☆34Jun 23, 2021Updated 4 years ago
- The most exhaustive list of reliable DNS resolvers.☆955Updated this week
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- You can find hardcoded Api-Key,Secret,Token Etc..☆77Sep 3, 2022Updated 3 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Feb 16, 2022Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- Real-world infosec wordlists, updated regularly☆1,642Updated this week
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆328Jul 11, 2025Updated 7 months ago
- Automated privilege escalation of the world's most popular Docker images.☆69Sep 25, 2023Updated 2 years ago
- Distribute ordinary bash commands over many systems☆168Aug 29, 2022Updated 3 years ago
- Find subdomains on GitLab.☆107Apr 28, 2024Updated last year
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆85Jan 12, 2026Updated last month
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- DNS resolution tracing tool☆35Jun 29, 2021Updated 4 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆156Nov 24, 2023Updated 2 years ago
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆506Jul 17, 2022Updated 3 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Oct 13, 2022Updated 3 years ago
- Handy scripts and one-liners to make life easier☆36Mar 6, 2023Updated 2 years ago
- Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.☆59Jan 22, 2023Updated 3 years ago