Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.
☆112Feb 16, 2022Updated 4 years ago
Alternatives and similar repositories for log4j
Users that are interested in log4j are comparing it to the libraries listed below
Sorting:
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago
- Magic Header Blind Xss tool (deliver blind xss payloads in request headers).☆25May 30, 2021Updated 4 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆184Nov 22, 2021Updated 4 years ago
- Nuclei templates for K8S security scanning☆101Dec 2, 2021Updated 4 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Sep 25, 2023Updated 2 years ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆64Aug 9, 2023Updated 2 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆156Nov 24, 2023Updated 2 years ago
- Passively check for XSS character encodings☆18Feb 7, 2026Updated 3 weeks ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆273Sep 25, 2023Updated 2 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆58Jan 10, 2022Updated 4 years ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,039Aug 23, 2025Updated 6 months ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- Basic implementation of certstream to print new subdomains and domains☆36Jul 6, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Finding XSS during recon☆273Sep 13, 2022Updated 3 years ago
- Filter and enrich a list of subdomains by level☆210Sep 25, 2023Updated 2 years ago
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆534Dec 4, 2024Updated last year
- Asset inventory of over 800 public bug bounty programs.☆1,519Feb 14, 2025Updated last year
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- ☆27Mar 18, 2020Updated 5 years ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- ☆16Mar 29, 2024Updated last year
- ☆12Jan 4, 2022Updated 4 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- ☆299Jul 16, 2022Updated 3 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆116Feb 18, 2023Updated 3 years ago
- Find CVE PoCs on GitHub☆161Aug 1, 2025Updated 7 months ago
- Scrape domain names from SSL certificates of arbitrary hosts☆690Mar 31, 2024Updated last year
- GH-Takeover — GitHub Pages Sub-domain Takeover Automation!☆28Apr 17, 2021Updated 4 years ago
- My Custom made Nuceli-Templates☆22Aug 5, 2025Updated 6 months ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆131Mar 10, 2022Updated 3 years ago
- Common Web Managers Fuzz Wordlists☆176Jan 2, 2026Updated 2 months ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆60May 10, 2022Updated 3 years ago
- A simple reverse whois lookup tool which returns a list of domains owned by people or companies☆187May 5, 2023Updated 2 years ago