0xacb / recollapseLinks
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications
☆1,270Updated 4 months ago
Alternatives and similar repositories for recollapse
Users that are interested in recollapse are comparing it to the libraries listed below
Sorting:
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,445Updated this week
- An IIS short filename enumeration tool☆1,047Updated last year
- declutters url lists for crawling/pentesting☆1,501Updated 10 months ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,475Updated this week
- bypass-url-parser☆1,104Updated last week
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆744Updated 2 weeks ago
- ☆529Updated last month
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,708Updated last year
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,031Updated 4 months ago
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,235Updated 3 weeks ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆699Updated 2 years ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,388Updated 5 months ago
- ☆788Updated 6 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆970Updated last year
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆738Updated 2 years ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆85Updated last year
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,394Updated 5 months ago
- The most exhaustive list of reliable DNS resolvers.☆914Updated this week
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,265Updated last year
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,006Updated last year
- Fast and customizable subdomain wordlist generator using DSL☆902Updated last week
- A fuzzer for detecting open redirect vulnerabilities☆781Updated last year
- Accept URLs on stdin, replace all query string values with a user-supplied value☆854Updated 3 years ago
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,384Updated last year
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆559Updated 9 months ago
- Free, libre, effective, and data-driven wordlists for all!☆641Updated 4 years ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆731Updated last year
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆955Updated 11 months ago
- 1337 Wordlists for Bug Bounty Hunting☆913Updated 3 months ago
- ☆579Updated 4 months ago