☆44Aug 5, 2022Updated 3 years ago
Alternatives and similar repositories for fast-detects
Users that are interested in fast-detects are comparing it to the libraries listed below
Sorting:
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 7 months ago
- Nuclei Templates☆14Jan 13, 2023Updated 3 years ago
- ☆31Apr 6, 2021Updated 4 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- ☆22Jul 16, 2021Updated 4 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- A repository of some useful grep patterns for tomnomnoms gf tool☆38Oct 11, 2020Updated 5 years ago
- ☆40Jun 5, 2021Updated 4 years ago
- bypass 401/403☆13Sep 13, 2022Updated 3 years ago
- A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF☆172Mar 29, 2020Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Shodan Favicon Hash Generator By Aziz Hakim @eternyle☆26May 25, 2024Updated last year
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42May 9, 2020Updated 5 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- Collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, …☆27May 9, 2022Updated 3 years ago
- web cache poison - Top 1 web hacking technique of 2019☆25Feb 24, 2020Updated 6 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago
- Android application penetration testing for the masses.☆13Apr 12, 2019Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- ☆15Oct 7, 2016Updated 9 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- Google Translate client for Crystal☆14Feb 8, 2018Updated 8 years ago
- Vulnerability Cheatsheet☆54Apr 22, 2022Updated 3 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- Crawl website extract links☆57Jun 1, 2020Updated 5 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- A simple framework for sending test payloads for known web CVEs.☆132Dec 16, 2020Updated 5 years ago
- ☆15Oct 11, 2023Updated 2 years ago
- Crystal shard aiming to assist with parsing backtraces into a structured form.☆18Apr 23, 2025Updated 10 months ago
- ☆12Jan 4, 2022Updated 4 years ago