0xacb / recollapseLinks
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications
☆1,233Updated last month
Alternatives and similar repositories for recollapse
Users that are interested in recollapse are comparing it to the libraries listed below
Sorting:
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,394Updated this week
- bypass-url-parser☆1,093Updated this week
- An IIS short filename enumeration tool☆1,009Updated 10 months ago
- ☆508Updated 3 weeks ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆961Updated last year
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,435Updated last month
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,637Updated last year
- declutters url lists for crawling/pentesting☆1,441Updated 7 months ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,008Updated last month
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,198Updated 3 months ago
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆692Updated 2 weeks ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,318Updated 2 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆677Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆74Updated last year
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,351Updated 3 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆690Updated 2 years ago
- ☆755Updated 3 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆990Updated last year
- ☆566Updated last month
- Fast and customizable subdomain wordlist generator using DSL☆867Updated 2 weeks ago
- Free, libre, effective, and data-driven wordlists for all!☆628Updated 4 years ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,219Updated last year
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆879Updated 2 years ago
- A fuzzer for detecting open redirect vulnerabilities☆775Updated last year
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆545Updated 6 months ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆917Updated 8 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆696Updated last week
- The most exhaustive list of reliable DNS resolvers.☆856Updated this week
- Unleash the power of cloud☆801Updated 10 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆708Updated last year