☆113Nov 14, 2024Updated last year
Alternatives and similar repositories for GWTMap
Users that are interested in GWTMap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BurpSuite extension that helps find user input in a GWT body.☆12May 29, 2020Updated 5 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- A set of tools made to assist in penetration testing GWT applications. Additional details about these tools can be found on my OWASP Apps…☆237Jan 21, 2020Updated 6 years ago
- Platform independent library for interfacing windows security descriptors☆23Jan 2, 2026Updated 2 months ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- ☆11Mar 30, 2017Updated 8 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- project-blacklist3r☆637Oct 3, 2025Updated 5 months ago
- Improve automated and semi-automated active scanning in Burp Pro☆66Jun 4, 2025Updated 9 months ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆47Dec 24, 2020Updated 5 years ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Jan 13, 2026Updated 2 months ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆15Feb 10, 2023Updated 3 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Jul 9, 2025Updated 8 months ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Oct 22, 2020Updated 5 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- automated web assets enumeration & scanning [DEPRECATED]☆288Mar 7, 2023Updated 3 years ago
- ☆36Jul 15, 2020Updated 5 years ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆182Aug 22, 2020Updated 5 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- Piper Burp Suite Extender plugin☆130Jan 14, 2026Updated 2 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- Kerberos protocol attacker☆139Feb 1, 2021Updated 5 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Custom scripts for the PIPER Burp extensions.☆97Sep 24, 2023Updated 2 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- Wireless Pentest☆18Apr 5, 2018Updated 7 years ago
- Turbo Intruder Scripts☆229Jun 11, 2020Updated 5 years ago
- Some of my public exploits☆52Sep 15, 2020Updated 5 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year