☆73Nov 22, 2021Updated 4 years ago
Alternatives and similar repositories for chronorace
Users that are interested in chronorace are comparing it to the libraries listed below
Sorting:
- WILSON Cloud Respwnder is a Web Interaction Logger Sending Out Notifications with the ability to serve custom content in order to appropr…☆50Feb 27, 2026Updated 3 weeks ago
- ☆65Dec 9, 2021Updated 4 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Jul 30, 2022Updated 3 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Dec 11, 2020Updated 5 years ago
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- Extract relative urls from a heap snapshot☆87May 30, 2021Updated 4 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆968Jan 10, 2025Updated last year
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- ☆35Feb 10, 2023Updated 3 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- Unofficial documentation for the great tool Param Miner☆184Aug 21, 2022Updated 3 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,028Feb 22, 2026Updated 3 weeks ago
- Basic implementation of certstream to print new subdomains and domains☆36Jul 6, 2021Updated 4 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆93Nov 21, 2021Updated 4 years ago
- List of periodically validated public DNS resolvers☆236Updated this week
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Sep 23, 2022Updated 3 years ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆779Aug 19, 2024Updated last year
- #JavascriptRecon #bugbounty☆21Aug 18, 2021Updated 4 years ago
- ☆56Aug 26, 2021Updated 4 years ago
- Generates permutations, alterations and mutations of subdomains. Auto Resolve what we find.☆11Dec 8, 2020Updated 5 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆959Dec 31, 2021Updated 4 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆256Dec 8, 2021Updated 4 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- ☆695Jul 4, 2022Updated 3 years ago
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- ☆705Nov 27, 2024Updated last year
- ☆563Mar 27, 2025Updated 11 months ago
- Stay within program scope☆37Aug 17, 2022Updated 3 years ago
- Sample Obsidian's vault for web pentesting☆107Aug 8, 2024Updated last year