un4ckn0wl3z / hackingarticles-offlineLinks
hackingarticles.in offline readable
☆21Updated 4 years ago
Alternatives and similar repositories for hackingarticles-offline
Users that are interested in hackingarticles-offline are comparing it to the libraries listed below
Sorting:
- DNS hijacking via dead records automation tool☆53Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Updated 3 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- ☆19Updated 8 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Updated 5 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Updated 5 years ago
- ☆17Updated 3 years ago
- Security test tool for Blind XSS☆26Updated 5 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- Very loud vBulletin exploit☆14Updated 5 years ago
- Burp Suite plugin that dynamically generates Google 2FA codes for use in session handling rules (approved by PortSwigger for inclusion in…☆29Updated last month
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆17Updated 4 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last year
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated last month
- A python library to automate time-based blind SQL injection☆49Updated 6 years ago
- Random Tips and Writeups.☆15Updated 6 years ago
- A custom script I created because I got tired of installing my tools manually!☆13Updated 11 months ago
- S3 bucket enumerator☆30Updated 6 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Updated 6 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Updated 4 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆59Updated 10 months ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE☆31Updated 5 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Site fast fuzzing with chorme extension.☆24Updated 3 years ago