418sec / huntr
Public Roadmap | huntr.dev
☆263Updated last year
Alternatives and similar repositories for huntr:
Users that are interested in huntr are comparing it to the libraries listed below
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆317Updated 3 months ago
- a javascript change monitoring tool for bugbounties☆601Updated 6 months ago
- A tool to check a bunch of URLs that contain reflecting params.☆557Updated 5 months ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆207Updated 4 years ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆501Updated 2 years ago
- Default signature for Jaeles Scanner☆321Updated 2 years ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆297Updated last year
- Second-order subdomain takeover scanner☆384Updated last year
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆285Updated last year
- ☆172Updated 3 years ago
- Bugbounty scope tool☆323Updated last month
- Python based scanner to find potential SSRF parameters☆307Updated 10 months ago
- A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily rep…☆252Updated last year
- Secret and/or credential patterns used for gf.☆237Updated last year
- ☆370Updated 3 years ago
- Continuous monitoring for JavaScript files☆219Updated 5 years ago
- Python library and CLI for the Bug Bounty Recon API☆222Updated 3 years ago
- A DNS Bruteforcing Wordlist Generator☆350Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆619Updated 2 months ago
- Web App bug hunting☆556Updated 7 months ago
- ☆394Updated 3 years ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆400Updated 3 months ago
- Burp extension to create target specific and tailored wordlist from burp history.☆233Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆308Updated 10 months ago
- ☆285Updated 2 years ago
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆349Updated 4 years ago
- Nuclei templates written by us.☆266Updated 3 years ago
- Match and Replace script used to automatically generate JSON option file to BurpSuite☆213Updated 5 years ago
- Client Side Prototype Pollution Scanner☆510Updated 2 years ago
- Fetches javascript file from a list of URLS or subdomains.☆753Updated last year