☆20Jun 16, 2019Updated 6 years ago
Alternatives and similar repositories for aem-hacker
Users that are interested in aem-hacker are comparing it to the libraries listed below
Sorting:
- A curated repository of the tools, scripts, resources and programs I use regularly for CTF, BB or other security work.☆15Aug 4, 2021Updated 4 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- ☆20Jan 5, 2024Updated 2 years ago
- PoC for CVE-2021-45897☆18Jan 31, 2022Updated 4 years ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Feb 21, 2026Updated last week
- Subdomain Monitor A production-ready subdomain monitoring system with both API and CLI interfaces.☆74Jan 28, 2026Updated last month
- ☆18Jul 26, 2021Updated 4 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Jan 14, 2019Updated 7 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- ☆23Jun 17, 2024Updated last year
- Spring Boot Actuator + Spring Cloud Vul Env☆19Dec 25, 2019Updated 6 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- script python to check url list via cookies and Authorization☆19Feb 28, 2023Updated 3 years ago
- ☆22Aug 18, 2018Updated 7 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- Check whether the domain has a rate limit enabled.☆66Aug 6, 2024Updated last year
- Script for Bug Bounty☆29Sep 17, 2021Updated 4 years ago
- GraphQL security workshop labs☆117Jan 31, 2026Updated last month
- ☆810Jul 28, 2024Updated last year
- ☆10Updated this week
- ☆80Jan 30, 2026Updated last month
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Mar 12, 2022Updated 3 years ago
- Vulnerability☆33Oct 31, 2025Updated 4 months ago
- Archive of Potential Insider Threats☆152Sep 25, 2023Updated 2 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- My personal dotfiles☆67Feb 21, 2026Updated last week
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- A collection of impressive and useful results from OpenAI's chatgpt☆74Dec 2, 2022Updated 3 years ago
- Monitoring the Cloud Landscape☆92Updated this week
- Vulnerability disclosure policies in the US Government's executive branch☆39Mar 28, 2023Updated 2 years ago
- You can find hardcoded Api-Key,Secret,Token Etc..☆77Sep 3, 2022Updated 3 years ago
- ☆43Mar 13, 2023Updated 2 years ago
- Python client for IP to ASN lookup services☆12Feb 21, 2026Updated last week
- ☆13Aug 19, 2015Updated 10 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- basic bbtools , buggy , not recommended to use☆35Jan 22, 2025Updated last year
- 之前的个人wiki。现在用 Blog 的形式来写了。这个wiki就放在这里吧。希望里面的内容能帮助到别人。☆10Apr 2, 2020Updated 5 years ago