BuildHackSecure / ffufmeLinks
Target practice for ffuf
☆69Updated 4 years ago
Alternatives and similar repositories for ffufme
Users that are interested in ffufme are comparing it to the libraries listed below
Sorting:
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Updated 2 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 3 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- Sample Obsidian's vault for web pentesting☆102Updated last year
- ☆38Updated 4 years ago
- HTTP verb tampering & methods enumeration☆64Updated 5 months ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆57Updated last year
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆130Updated last year
- A wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.☆62Updated 2 years ago
- ☆58Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 3 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆57Updated last year
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆84Updated last week
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆57Updated 5 years ago
- A list of threat sinks used in the manual security source code review for application security☆74Updated 2 years ago
- DNS resolution tracing tool☆36Updated 4 years ago
- Print the IP addresses in a given range☆49Updated 5 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 2 weeks ago
- ☆67Updated 2 years ago
- ☆58Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- ☆27Updated last year
- Archive of Potential Insider Threats☆153Updated 2 years ago