A Complete SSRF (Server Side Request Forgery) Scanner.
☆41Dec 1, 2025Updated 3 months ago
Alternatives and similar repositories for SSRF-Scanner
Users that are interested in SSRF-Scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Repo clone and organize all nuclei templates that are found in Github. { due to git runner time limit stopped the workflow, ping me …☆12Feb 28, 2025Updated last year
- ☆12Jun 16, 2021Updated 4 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆112Feb 14, 2022Updated 4 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 11 months ago
- Google maps api key checker for pentesting purpose☆28Oct 12, 2022Updated 3 years ago
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆15Apr 10, 2025Updated 11 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Pentest-Command☆20Nov 10, 2021Updated 4 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 11 years ago
- AI-based Web Application Penetration Testing Tool☆25Jan 19, 2024Updated 2 years ago
- A Python based scanner to find potential SSRF parameters in a web application.☆70Jul 12, 2021Updated 4 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- ☆15Dec 27, 2022Updated 3 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆24Jun 25, 2023Updated 2 years ago
- ☆12May 31, 2023Updated 2 years ago
- ☆26Sep 1, 2022Updated 3 years ago
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆16Jul 5, 2024Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- grafana 8.4.3 (b7d2911ca)☆29Aug 2, 2022Updated 3 years ago
- ☆62May 30, 2023Updated 2 years ago
- Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against mal…☆302Dec 30, 2025Updated 2 months ago
- A list of ChatGPT Prompts for Web Application Security, Bug Bounty, and Pentesting☆38May 18, 2023Updated 2 years ago
- sqlmap tamper script for unicode escape inside json☆14Dec 20, 2018Updated 7 years ago
- Wi-Fi MFP Deauthentication: proof-of-concepts, security patches, and more.☆32Apr 15, 2023Updated 2 years ago
- ThinkPHP vulnerability scan for BurpSuite☆15Nov 18, 2019Updated 6 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- an exploit of Server-side request forgery (SSRF)☆53Aug 2, 2024Updated last year
- BugBounty Hub: Your one-stop destination for Bug Bounty excellence! Explore Nuclei Templates and BugBounty Worldlists for comprehensive …☆16Apr 3, 2025Updated 11 months ago
- Attack Surface Discovery Tool☆110Sep 17, 2024Updated last year
- Smart context-based SSRF vulnerability scanner.☆360May 5, 2022Updated 3 years ago
- sql注入bypass waf工具,绕waf fuzz测试工具。☆49Jan 17, 2023Updated 3 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Passively check for XSS character encodings☆18Mar 9, 2026Updated 2 weeks ago