DEMON1A / Blinder
A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers
☆12Updated 2 years ago
Alternatives and similar repositories for Blinder:
Users that are interested in Blinder are comparing it to the libraries listed below
- This includes all the templates of nuclei collected from different sources☆16Updated 2 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Updated 3 years ago
- ☆21Updated 4 years ago
- Burpsuite Plugin to detect Directory Traversal vulnerabilities☆28Updated 3 years ago
- ☆10Updated last year
- Creating a Database for Mass Recon☆12Updated 3 years ago
- ☆25Updated 4 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Updated last year
- ☆11Updated 4 years ago
- ☆11Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆17Updated 3 years ago
- Funny Fuzzing Wordlist☆12Updated 2 years ago
- collection of various grep patterns collected from tomnomnom/gf and other places☆21Updated 4 years ago
- List of custom Nuclei templates☆15Updated last year
- Top level domain scanner in Go☆30Updated last year
- Alias for storing ffuf results☆20Updated 4 years ago
- Burp Suite Extensions☆12Updated 3 years ago
- Generating Sub-Sub-Subdomain + validating all of them☆10Updated last year
- 10 Reset Password Flaws Based on Web Application Security☆11Updated 4 years ago
- ☆14Updated 3 years ago
- Just simple log4j scanner☆12Updated 3 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Updated 4 years ago
- Private vulnerability testing suite☆15Updated 3 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆9Updated last year
- Endpoint monitor tool☆20Updated 4 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Updated 3 years ago
- ☆14Updated 11 months ago
- ☆42Updated 3 years ago
- all manner of wordlists☆25Updated 3 years ago