a benchmarking&stressing tool that can send raw HTTP requests
☆165Sep 24, 2022Updated 3 years ago
Alternatives and similar repositories for reqstress
Users that are interested in reqstress are comparing it to the libraries listed below
Sorting:
- ☆32May 9, 2021Updated 4 years ago
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- Git folder digger, I'm sure it's worthwhile stuff.☆38Jan 10, 2021Updated 5 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- Türk kullanıcıların parola seçimlerinin analizi için yapılmış bir çalışmadır☆837Sep 12, 2023Updated 2 years ago
- a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc☆647Jan 23, 2025Updated last year
- Winsock accept() Backdoor Implant.☆118Feb 13, 2021Updated 5 years ago
- Golang for Hackers☆270Oct 17, 2022Updated 3 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆136Dec 21, 2019Updated 6 years ago
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,664Jan 23, 2025Updated last year
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻☆124Sep 6, 2022Updated 3 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Aug 13, 2018Updated 7 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- Meetuplardan arta kalanlar☆42Aug 18, 2025Updated 6 months ago
- an ultimate evidence wiper☆64Mar 30, 2015Updated 10 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- ☆11Apr 25, 2022Updated 3 years ago
- WIP! Important metrics for SWE teams☆138Oct 10, 2022Updated 3 years ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- gURL is a cURL implementation with Go☆15Feb 24, 2026Updated last week
- ☆79Jun 7, 2022Updated 3 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Mar 7, 2021Updated 4 years ago
- ☆13Feb 7, 2020Updated 6 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Mar 5, 2021Updated 5 years ago
- Go Türkiye Event Template Generator 🥳☆25Aug 2, 2021Updated 4 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- ☆29May 1, 2020Updated 5 years ago
- Welcome to my dungeon. Here, I keep all my configuration files in case I have a stroke and lose all my memory. You're very welcome to exp…☆38Feb 24, 2026Updated last week
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆313Nov 4, 2025Updated 4 months ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago