1N3 / forbiddenLinks
Bypass 4xx HTTP response status codes and more. Based on PycURL.
☆15Updated 2 years ago
Alternatives and similar repositories for forbidden
Users that are interested in forbidden are comparing it to the libraries listed below
Sorting:
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- In-depth Attack Surface Mapping and Asset Discovery☆12Updated 5 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated last month
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 3 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 3 months ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆22Updated 2 years ago
- Rockyou for web fuzzing☆14Updated 3 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Param…☆41Updated last year
- Web application recon for bug bounty☆22Updated 5 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆22Updated 4 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- Information-Gathering Shell Script☆30Updated 4 years ago
- XSSRecon - Reflected XSS Scanner☆27Updated 4 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Updated 2 years ago
- This Tool is for web penetration Testing.☆19Updated 4 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 9 months ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆30Updated 4 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆18Updated 3 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆33Updated 6 years ago
- ☆12Updated 2 years ago