Subdomain Recon Tool
☆13Sep 11, 2022Updated 3 years ago
Alternatives and similar repositories for SubDiscovery
Users that are interested in SubDiscovery are comparing it to the libraries listed below
Sorting:
- Wolfy AV Bypasser☆30Feb 8, 2023Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- This is a simple process injection made in C for Linux systems☆30Sep 23, 2023Updated 2 years ago
- 「📖」Tool created to extract metadata from a domain☆14Dec 7, 2024Updated last year
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- 「💉」XSS Payload List☆45Feb 26, 2023Updated 3 years ago
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆107Sep 16, 2022Updated 3 years ago
- 「💽」MBR Overwrite malware for linux☆28Dec 7, 2024Updated last year
- Encurtador de URL, com patterns de cache e write behind usando Redis e MongoDB☆18Mar 8, 2025Updated 11 months ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Jun 4, 2022Updated 3 years ago
- 『🔍』Simple Information finder using Google Dork☆34Dec 20, 2020Updated 5 years ago
- A simple script to automate systemd backdoor☆39Dec 19, 2022Updated 3 years ago
- 「🐞」Bug Bounty Tricks☆41Oct 4, 2023Updated 2 years ago
- SocialFish-Clone☆11May 3, 2018Updated 7 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 7 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- ☆44Dec 11, 2022Updated 3 years ago
- Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP To…☆12Jan 30, 2023Updated 3 years ago
- bypass 401/403☆13Sep 13, 2022Updated 3 years ago
- quick script for mixing wordlists in a way that maintains order. ([1,2],[3,4],[5,6] -> [1,3,5,2,4,6])☆10Mar 6, 2022Updated 3 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago
- ☆13Aug 10, 2022Updated 3 years ago
- This Repo clone and organize all nuclei templates that are found in Github. { due to git runner time limit stopped the workflow, ping me …☆12Feb 28, 2025Updated last year
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- 该资源为杨秀璋作者《Python网络数据爬取及分析从入门到精通(分析篇)》书籍所有源代码,包括可视化分析、聚类分析、回归分析、分类分析、词云和LDA分析等内容。所有代码已修改为Python3实现,希望对您有所帮助,一起加油。☆11Aug 12, 2021Updated 4 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- ☆13Jun 26, 2025Updated 8 months ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- 「🍯」Simple low-interaction honeypot with FTP, Telnet and Web☆12Dec 7, 2024Updated last year
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- ☆10Jun 26, 2017Updated 8 years ago
- Cross Site Scripting Cheat sheet.☆12Apr 3, 2021Updated 4 years ago
- 「🔎」CORS vulnerability scanner☆12Dec 7, 2024Updated last year
- ☆12Jun 16, 2021Updated 4 years ago
- BPP hunting☆10Nov 10, 2024Updated last year