EnableSecurity / reportsLinks
Reports issued by Enable Security
☆10Updated 2 years ago
Alternatives and similar repositories for reports
Users that are interested in reports are comparing it to the libraries listed below
Sorting:
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Burp Suite Pro extension☆10Updated 8 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆20Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆19Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- ☆20Updated 5 years ago
- An Extended, Modulair, Host Discovery Framework☆43Updated 6 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- ☆33Updated 4 months ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- CVE-2020-5902☆9Updated 4 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆12Updated 5 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆28Updated 3 years ago
- Parse OpenAPI specifications, previously known as Swagger specifications, into the BurpSuite for automating RESTful API testing – approve…☆42Updated last year
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last year
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Updated 5 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 9 years ago