Skip to content
View Spix0r's full-sized avatar
🕷️
Crawling...
🕷️
Crawling...

Block or report Spix0r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Spix0r/README.md

Hello World!, I'm Mohammad-Reza👋🏼:

🕷 I'm A Cyber Security Enthusiast & Back-End Developer

💻 Tech Stack

Go Python JavaScript nodejs PHP Bash mongo mysql sqlite Github Git Docker

Pinned Loading

  1. writeup-miner writeup-miner Public

    This is a useful Python script for extracting bug bounty or any other write-ups from every RSS.

    Python 132 17

  2. robofinder robofinder Public

    Robofinder retrieves historical #robots.txt files from #Archive.org, allowing you to uncover previously disallowed directories and paths for any domain—essential for deepening your #OSINT and #reco…

    Python 183 21

  3. fback fback Public

    This is a useful Python script for generating a target specific wordlist for fuzzing backup files.

    Python 37 10

  4. cloudrecon cloudrecon Public

    This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeger.gay provider.

    Shell 43 3

  5. I’ve analyzed numerous tools, blogs,... I’ve analyzed numerous tools, blogs, tweets, and other resources on bypassing 403 Forbidden errors using HTTP Headers Fuzzing techniques. After extensive research, I’ve compiled a list of headers you can fuzz to potentially bypass 403 restrictions.
    1
    Allow: CONNECT
    2
    Allow: GET
    3
    Allow: HEAD
    4
    Allow: POST
    5
    Allow: TRACE
  6. FunPark FunPark Public

    Forked from StackWard/FunPark

    JavaScript