AtlasWiki / EndPointer
This is the open sourced code for the extension, EndPointer
☆59Updated 3 months ago
Alternatives and similar repositories for EndPointer:
Users that are interested in EndPointer are comparing it to the libraries listed below
- ☆141Updated 8 months ago
- ☆104Updated last year
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆164Updated 5 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆106Updated 4 months ago
- ☆118Updated last year
- Automate Recon XSS Bug Bounty☆134Updated this week
- ☆99Updated 6 months ago
- Gather results of dorks across a number of search engines☆101Updated 3 months ago
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.☆61Updated last month
- ParamScan is a chrome extension for finding reflected parameters in a webpage.☆74Updated last month
- Private Nuclei Templates☆97Updated last week
- Automated Subdomain Enumeration and Scanning Tool☆111Updated last year
- AI-powered ffuf wrapper☆297Updated 3 months ago
- ☆57Updated 3 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆140Updated this week
- ☆166Updated 3 weeks ago
- Ultimate Wordlist for Web Content Discovery☆67Updated 3 months ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆135Updated last year
- Python for AWAE (Advanced Web Attacks and Exploitation)☆93Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆103Updated 2 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆131Updated 4 months ago
- ☆34Updated 3 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆58Updated 4 months ago
- CLI tool to scan URLs for suspicious keywords, extensions, paths, and hidden files.☆44Updated 3 months ago
- ☆228Updated this week
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆35Updated 2 weeks ago
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆159Updated 3 weeks ago