Unsecure time-based secret exploitation and Sandwich attack implementation Resources
☆148Dec 9, 2024Updated last year
Alternatives and similar repositories for reset-tolkien
Users that are interested in reset-tolkien are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆228Jul 24, 2025Updated 8 months ago
- Differential testing framework for HTTP implementations☆928Jan 21, 2026Updated 2 months ago
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆787Dec 9, 2025Updated 4 months ago
- ☆154Aug 18, 2023Updated 2 years ago
- jxscout superpowers JavaScript analysis for security researchers☆450Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆41Aug 12, 2023Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,812May 22, 2024Updated last year
- ☆63Mar 1, 2023Updated 3 years ago
- Unleash the power of cloud☆816Nov 19, 2024Updated last year
- Scalpel is a Burp extension for intercepting and rewriting HTTP traffic, either on the fly or in the Repeater using Python 3 scripts.☆69May 31, 2024Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆839Mar 24, 2026Updated 3 weeks ago
- Some tips for Bug Bounty using LibreOffice☆57Feb 28, 2025Updated last year
- ☆28Jul 9, 2024Updated last year
- Burp Suite extension that offers a toolkit for testing GraphQL endpoints.☆202Aug 5, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Apr 11, 2024Updated 2 years ago
- Chrome extension for automating CSPT discovery☆145Mar 31, 2026Updated 2 weeks ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆964Dec 31, 2021Updated 4 years ago
- A streamlined tool for discovering private TLDs for security research.☆319Apr 6, 2026Updated last week
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆161Feb 11, 2026Updated 2 months ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆450Jan 25, 2024Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,336Aug 7, 2025Updated 8 months ago
- Results from analyzing data gathered from 1.6 billion subdomains☆32Oct 15, 2024Updated last year
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆64Jun 27, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Useful configurations for the DomLogger++ extension☆47Apr 7, 2026Updated last week
- An IIS short filename enumeration tool☆1,139Nov 25, 2024Updated last year
- ☆82Mar 26, 2024Updated 2 years ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆157Mar 31, 2025Updated last year
- Content-Type Research☆661Jun 29, 2025Updated 9 months ago
- ☆93Dec 15, 2025Updated 4 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago
- HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks☆221Mar 21, 2026Updated 3 weeks ago
- A tool to inspect and attack version 1 GUIDs☆239Oct 13, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,361Apr 4, 2026Updated last week
- Obtain GraphQL API schema even if the introspection is disabled☆1,423Dec 5, 2025Updated 4 months ago
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,304Jan 26, 2024Updated 2 years ago
- ai-based domain name generation☆137Feb 3, 2025Updated last year
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆439Mar 6, 2026Updated last month
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆900Updated this week
- Gather results of dorks across a number of search engines☆311Mar 20, 2026Updated 3 weeks ago