EasyRecon / Hunt3rLinks
Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework
☆168Updated 2 years ago
Alternatives and similar repositories for Hunt3r
Users that are interested in Hunt3r are comparing it to the libraries listed below
Sorting:
- Self-hosted passive subdomain continous monitoring tool.☆165Updated last year
- Custom scan profiles for use with Burp Suite Pro☆144Updated last year
- ☆157Updated 3 years ago
- Make URL path combinations using a wordlist☆173Updated last year
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆162Updated 2 years ago
- ☆161Updated 2 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆182Updated 2 years ago
- Opensource assets and vulnerability scanning tool☆181Updated last month
- Build your own reconnaissance system with Osmedeus Next Generation☆196Updated 2 weeks ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆140Updated 2 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆116Updated last year
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆243Updated 3 months ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆117Updated last year
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆102Updated 3 months ago
- Never forget where you inject.☆257Updated 2 years ago
- Get related domains / subdomains by looking at Google Analytics IDs☆246Updated 3 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆130Updated 3 years ago
- CVE Collection of jQuery XSS Payloads☆71Updated 2 years ago
- ☆113Updated 2 years ago
- Check AWS S3 instances for read/write/delete access☆121Updated 3 years ago
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆61Updated 2 years ago
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆276Updated last year
- A burp suite extension that reviews backup, old, temporary and unreferenced files on web server for sensitive information (OWASP WSTG-CON…☆162Updated last year
- Directory scans☆82Updated last year
- Prototype pollution scanner using headless chrome☆219Updated 2 years ago
- Execute Trickest workflows right from your terminal☆92Updated 2 weeks ago
- ☆245Updated 4 years ago
- A path-normalization pentesting tool.☆128Updated last year
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆214Updated last year
- Describe how to use ffuf different options with examples☆89Updated 2 years ago