ARPSyndicate / kenzerLinks
automated web assets enumeration & scanning [DEPRECATED]
☆289Updated 2 years ago
Alternatives and similar repositories for kenzer
Users that are interested in kenzer are comparing it to the libraries listed below
Sorting:
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆262Updated 3 years ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆281Updated last year
- Combined port scanning w/ Masscan's speed & Nmap's scanning features.☆155Updated 3 years ago
- Toolkit to detect and keep track on Blind XSS, XXE & SSRF☆292Updated 6 years ago
- Nuclei templates written by geeknik. Claude is my co-pilot. 🤖☆283Updated 3 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆267Updated 2 years ago
- Python tool to find potential Server Side Reqest Forgery (SSRF) vulnerability parameters.☆335Updated 3 months ago
- An automated target reconnaissance pipeline.☆440Updated 2 years ago
- Scrapts Scrapts Scrapts☆240Updated last year
- Default signature for Jaeles Scanner☆325Updated 3 years ago
- ☆145Updated 3 years ago
- Hidden parameters discovery suite☆226Updated 3 years ago
- A blind XSS detection and XSS data capture framework☆172Updated 2 weeks ago
- Python library and CLI for the Bug Bounty Recon API☆231Updated 4 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆278Updated 4 years ago
- Recon Automation for hackers by hackers☆256Updated 5 years ago
- One stop place for exploiting Jira instances in your proximity☆190Updated last year
- Get related domains / subdomains by looking at Google Analytics IDs☆248Updated 3 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆273Updated 9 months ago
- Automated blind-xss search for Burp Suite☆286Updated 6 years ago
- An hourly updated list of subdomains gathered from certificate transparency logs☆349Updated 4 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆134Updated 4 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆200Updated 3 months ago
- Http request smuggling vulnerability scanner☆229Updated 3 years ago
- Second-order subdomain takeover scanner☆406Updated 2 months ago
- Full Nuclei automation script with logic explanation.☆245Updated 3 years ago
- Bugbounty scope tool☆331Updated 8 months ago
- ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight☆219Updated 3 years ago
- A python tool to check subdomain takeover vulnerability☆336Updated 2 years ago
- Burp Bounty profiles compilation, feel free to contribute!☆148Updated 4 years ago