0xacb / recollapseLinks
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications
☆1,241Updated 2 months ago
Alternatives and similar repositories for recollapse
Users that are interested in recollapse are comparing it to the libraries listed below
Sorting:
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,411Updated last week
- An IIS short filename enumeration tool☆1,012Updated 10 months ago
- declutters url lists for crawling/pentesting☆1,450Updated 8 months ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,449Updated 3 weeks ago
- bypass-url-parser☆1,094Updated this week
- ☆513Updated last week
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,015Updated 2 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,650Updated last year
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,203Updated last week
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆703Updated last month
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆991Updated last year
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,330Updated 3 months ago
- ☆766Updated 4 months ago
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,367Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆683Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆75Updated last year
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,226Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆964Updated last year
- A fuzzer for detecting open redirect vulnerabilities☆777Updated last year
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆693Updated 2 years ago
- Free, libre, effective, and data-driven wordlists for all!☆636Updated 4 years ago
- Accept URLs on stdin, replace all query string values with a user-supplied value☆842Updated 2 years ago
- A wordlist of API names for web application assessments☆850Updated 4 months ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,361Updated 3 months ago
- ☆1,036Updated last month
- ☆569Updated 2 months ago
- Asset inventory of over 800 public bug bounty programs.☆1,464Updated 8 months ago
- Fast and customizable subdomain wordlist generator using DSL☆875Updated last month
- Hidden parameters discovery suite☆1,932Updated last year
- Automation for javascript recon in bug bounty.☆1,051Updated 2 years ago