GangGreenTemperTatum / DOMspy
A web security research tool for DOM testing
☆19Updated last week
Alternatives and similar repositories for DOMspy:
Users that are interested in DOMspy are comparing it to the libraries listed below
- Additional active scan checks for BURP☆26Updated 5 months ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆29Updated 2 months ago
- Ffuf output browser☆39Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 7 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated 3 weeks ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 7 months ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 2 months ago
- Looks for parameters in urls☆34Updated 5 months ago
- ☆12Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆70Updated 3 years ago
- ☆25Updated last week
- Advanced test for proxy & waf☆13Updated 6 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 6 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆12Updated last year
- Unicode Security Toolkit☆34Updated 5 months ago
- Tool for fetching all the available waybackmachine snapshot urls☆20Updated 5 months ago
- ☆17Updated last year
- Bcheck scripts for Burp☆25Updated 7 months ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆49Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 8 months ago
- ☆17Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- A collection of one off hacks and simple scripts☆28Updated 2 years ago
- ☆56Updated 10 months ago
- Stay within program scope☆37Updated 2 years ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆24Updated last year