BishopFox / sjLinks
A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.
☆702Updated last month
Alternatives and similar repositories for sj
Users that are interested in sj are comparing it to the libraries listed below
Sorting:
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆683Updated last year
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆638Updated last month
- ☆501Updated last year
- AI-powered ffuf wrapper☆544Updated 10 months ago
- CT Log Scanner☆408Updated 6 months ago
- Discover new target domains using Content Security Policy☆484Updated this week
- ☆513Updated last week
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆384Updated 5 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆714Updated last year
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,015Updated 2 months ago
- ☆540Updated last year
- Bambdas collection for Burp Suite Professional and Community.☆414Updated this week
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆452Updated 3 years ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆75Updated last year
- An IIS short filename enumeration tool☆1,018Updated 11 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆433Updated 9 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆321Updated 10 months ago
- Local File Inclusion discovery and exploitation tool☆330Updated 9 months ago
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆710Updated last month
- Fast and customizable subdomain wordlist generator using DSL☆875Updated last month
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆964Updated last year
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆409Updated 2 years ago
- i will upload more templates here to share with the comunity.☆558Updated last year
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆549Updated 7 months ago
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆401Updated last week
- Fast and customizable vulnerability scanner For JIRA written in Python☆344Updated 9 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆281Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆496Updated 3 years ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆351Updated last year
- Golang client for querying SecurityTrails API data☆573Updated 2 years ago