trickest / packagesLinks
Automated compromise detection of the world's most popular packages
☆17Updated 2 years ago
Alternatives and similar repositories for packages
Users that are interested in packages are comparing it to the libraries listed below
Sorting:
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Ffuf output browser☆40Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 4 years ago
- ☆26Updated 3 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Updated 4 years ago
- HTTP requests of FrontPage expolit☆26Updated 12 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- Accompanying material needed for the workshop☆11Updated 2 years ago
- ☆30Updated 2 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 5 years ago
- ☆36Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- ☆12Updated 4 years ago
- Tool to extract & validate google fcm server keys from apks☆29Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- an Evil Java RMI Registry.☆51Updated 3 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Attempt zone transfers on domains☆18Updated 4 years ago
- ☆16Updated 3 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated 2 years ago
- ☆12Updated 3 years ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆53Updated 2 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 4 years ago