NelmiocorsbundleThe NelmioCorsBundle allows you to send Cross-Origin Resource Sharing
headers with ACL-style per-URL configuration.
Stars: ✭ 1,615 (+822.86%)
corsDeno.js CORS middleware.
Stars: ✭ 46 (-73.71%)
Sanic CorsA Sanic extension for handling Cross Origin Resource Sharing (CORS), making cross-origin AJAX possible. Based on flask-cors by Cory Dolphin.
Stars: ✭ 143 (-18.29%)
NatlasScaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Stars: ✭ 333 (+90.29%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+561.14%)
BxssbXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
Stars: ✭ 331 (+89.14%)
querytoolQuerytool is an OSINT framework based on Google Spreadsheets. With this tool you can perform complex search of terms, people, email addresses, files and many more.
Stars: ✭ 104 (-40.57%)
WorkersCloudflare Workers
Stars: ✭ 111 (-36.57%)
Sqlivmassive SQL injection vulnerability scanner
Stars: ✭ 840 (+380%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+87.43%)
WhitewidowSQL Vulnerability Scanner
Stars: ✭ 926 (+429.14%)
Ssti Payloads🎯 Server Side Template Injection Payloads
Stars: ✭ 150 (-14.29%)
Spaces FinderA tool to hunt for publicly accessible DigitalOcean Spaces
Stars: ✭ 122 (-30.29%)
SirepratRemote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)
Stars: ✭ 326 (+86.29%)
Cve 2019 7609exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts
Stars: ✭ 108 (-38.29%)
WhourTool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.
Stars: ✭ 18 (-89.71%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (+365.14%)
ldapconsoleThe ldapconsole script allows you to perform custom LDAP requests to a Windows domain.
Stars: ✭ 25 (-85.71%)
AlbatarAlbatar is a SQLi exploitation framework in Python
Stars: ✭ 108 (-38.29%)
ksubdomainSubdomain enumeration tool, asynchronous dns packets, use pcap to scan 1600,000 subdomains in 1 second
Stars: ✭ 320 (+82.86%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+349.14%)
hack-pet🐰 Managing command snippets for hackers/bug bounty hunters. with pet.
Stars: ✭ 77 (-56%)
ParamspiderMining parameters from dark corners of Web Archives
Stars: ✭ 781 (+346.29%)
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-40%)
daily-commonspeak2commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. Please use it instead: https://github.com/assetnote/wordlists
Stars: ✭ 38 (-78.29%)
HiddenWindows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc
Stars: ✭ 768 (+338.86%)
ReconcatA small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-62.29%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (+84%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+334.29%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-41.14%)
gwdomainssub domain wild card filtering tool
Stars: ✭ 38 (-78.29%)
MobilehackersweaponsMobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-2.86%)
Bruteforce ListsSome files for bruteforcing certain things.
Stars: ✭ 320 (+82.86%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-64.57%)
Node Typescript Koa RestREST API boilerplate using NodeJS and KOA2, typescript. Logging and JWT as middlewares. TypeORM with class-validator, SQL CRUD. Docker included. Swagger docs, actions CI and valuable README
Stars: ✭ 739 (+322.29%)
ldap2jsonThe ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.
Stars: ✭ 56 (-68%)
Nuclei TemplatesCommunity curated list of templates for the nuclei engine to find security vulnerabilities.
Stars: ✭ 1,354 (+673.71%)
BugHunterIDPara pencari bug / celah kemanan bisa bergabung.
Stars: ✭ 72 (-58.86%)
WpreconWPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-22.86%)
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (+53.71%)
S3reverseThe format of various s3 buckets is convert in one format. for bugbounty and security testing.
Stars: ✭ 61 (-65.14%)
PulsarNetwork footprint scanner platform. Discover domains and run your custom checks periodically.
Stars: ✭ 314 (+79.43%)
Cors ContainerA CORS proxy in a container (Docker) for when you need to `Access-Control-Allow-Origin: *`!
Stars: ✭ 150 (-14.29%)
0l4bsCross-site scripting labs for web application security enthusiasts
Stars: ✭ 119 (-32%)
ZileExtract API keys from file or url using by magic of python and regex.
Stars: ✭ 61 (-65.14%)
Findom XssA fast DOM based XSS vulnerability scanner with simplicity.
Stars: ✭ 310 (+77.14%)
HettyHetty is an HTTP toolkit for security research.
Stars: ✭ 3,596 (+1954.86%)