trickest / packagesLinks
Automated compromise detection of the world's most popular packages
☆17Updated 2 years ago
Alternatives and similar repositories for packages
Users that are interested in packages are comparing it to the libraries listed below
Sorting:
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Python script to launch burp scans automatically☆31Updated 4 years ago
- Ffuf output browser☆39Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- ☆26Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- HTTP requests of FrontPage expolit☆26Updated 11 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Updated 4 years ago
- Default plugins for Jaeles Scanner☆35Updated 4 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Manage attack surface data on Elasticsearch☆23Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Tool to extract & validate google fcm server keys from apks☆29Updated 4 years ago
- ☆36Updated 9 months ago
- ☆31Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- A BurpSuite plugin for BBRF☆25Updated 11 months ago
- ☆29Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- ☆12Updated 8 months ago