Skip to content
View Spix0r's full-sized avatar
🕷️
Crawling...
🕷️
Crawling...

Block or report Spix0r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. writeup-miner writeup-miner Public

    This is a useful Python script for extracting bug bounty or any other write-ups from Medium.com and other websites (soon).

    Python 108 12

  2. robofinder robofinder Public

    Robofinder retrieves historical #robots.txt files from #Archive.org, allowing you to uncover previously disallowed directories and paths for any domain—essential for deepening your #OSINT and #reco…

    Python 69 8

  3. fback fback Public

    This is a useful Python script for generating a target specific wordlist for fuzzing backup files.

    Python 31 8

  4. cloudrecon cloudrecon Public

    This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeger.gay provider.

    Shell 31 1

  5. I’ve analyzed numerous tools, blogs,... I’ve analyzed numerous tools, blogs, tweets, and other resources on bypassing 403 Forbidden errors using HTTP Headers Fuzzing techniques. After extensive research, I’ve compiled a list of headers you can fuzz to potentially bypass 403 restrictions.
    1
    Allow: CONNECT
    2
    Allow: GET
    3
    Allow: HEAD
    4
    Allow: POST
    5
    Allow: TRACE
  6. Nuclei-Community-Templates Nuclei-Community-Templates Public

    A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!

    16 2