Curated list of Meta (formerly Facebook) owned IT assets
☆56Jul 20, 2025Updated 7 months ago
Alternatives and similar repositories for Meta-Owned-IT-Assets
Users that are interested in Meta-Owned-IT-Assets are comparing it to the libraries listed below
Sorting:
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- ☆20Apr 5, 2023Updated 2 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- Automatic SQL injection and database takeover tool☆45Nov 27, 2025Updated 3 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆36Mar 4, 2025Updated last year
- 🎉 CVE Monitor v1.0☆26Jun 30, 2025Updated 8 months ago
- A tool to migrate Burpsuite HTTP history to Caido☆35Apr 25, 2025Updated 10 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago
- Monitoring the Cloud Landscape☆92Updated this week
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Jun 6, 2024Updated last year
- vīlicus is a bug bounty api dashboard☆41Aug 13, 2023Updated 2 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Curated UTF-8 URL-encoded character dictionary for injection testing, fuzzing, and bypass techniques against web applications and APIs, f…☆13Sep 20, 2021Updated 4 years ago
- My talks...☆25Feb 27, 2025Updated last year
- ☆47Sep 20, 2024Updated last year
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆54Dec 9, 2024Updated last year
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- InfiniteWP Client < 1.9.4.5 - Authentication Bypass☆21Jul 28, 2021Updated 4 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Write-ups of my findings.☆123Sep 2, 2023Updated 2 years ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated last year
- Bypass Reset Password Code Lead to Account Takeover☆26Sep 16, 2024Updated last year
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Endpoint enumeration☆11Apr 1, 2022Updated 3 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆13Jun 27, 2023Updated 2 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆189Aug 8, 2024Updated last year
- ☆99Mar 6, 2023Updated 3 years ago
- ☆139Nov 9, 2024Updated last year
- ☆36Jun 21, 2024Updated last year
- Small python script to extract Facebook deeplinks from an APK file☆14Oct 30, 2020Updated 5 years ago
- ☆14Feb 7, 2024Updated 2 years ago