HTTP parameter discovery suite.
☆65Jun 3, 2020Updated 5 years ago
Alternatives and similar repositories for Arjun
Users that are interested in Arjun are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- Some useful test data or payloads☆24Oct 30, 2021Updated 4 years ago
- Vulnerable API☆419Mar 4, 2023Updated 3 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- ohrwurm is an RTP fuzzer. features some SIP parsing and RTCP suppressing.☆17Sep 30, 2010Updated 15 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Mar 7, 2024Updated 2 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Aug 1, 2018Updated 7 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- A browser bookmark to show hidden fields and enable disabled fields on a web page☆20Oct 29, 2023Updated 2 years ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Shodan Favicon Hash Generator By Aziz Hakim @eternyle☆26May 25, 2024Updated last year
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.☆17Feb 25, 2026Updated 3 weeks ago
- Contextual Content Discovery Tool☆3,121Apr 29, 2024Updated last year
- AI-driven CVE search - deepest analysis of Common Vulnerabilities and Exposures (CVE)☆13Feb 22, 2024Updated 2 years ago
- API testing tool written with Python☆56Feb 8, 2017Updated 9 years ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- Presentation presented at DEFCON 27 PHV☆27Aug 14, 2019Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- retrive metadata endpoint data with these one liners.☆41Aug 11, 2020Updated 5 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Generates permutations, alterations and mutations of subdomains. Auto Resolve what we find.☆11Dec 8, 2020Updated 5 years ago
- ☆54Jan 22, 2025Updated last year
- Proof of concept code for client-side vulnerabilities☆17Mar 14, 2019Updated 7 years ago
- Heuristic Vulnerable Parameter Scanner☆601Jan 8, 2024Updated 2 years ago
- Fuzz 403/401ing endpoints for bypasses☆10Aug 14, 2020Updated 5 years ago
- Utility to pull disclosed vulnerabilities from HackerOne private programs - for personal use only☆13Aug 22, 2021Updated 4 years ago
- ☆13Sep 8, 2024Updated last year
- Detectify Crowdsource Challenge☆73Apr 26, 2022Updated 3 years ago
- A comprehensive list of aerospace affiliated CVEs 🚀👾⚠️☆28Dec 22, 2024Updated last year
- Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote cod…☆12Jul 2, 2024Updated last year
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- ☆25Feb 11, 2024Updated 2 years ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- You can find hardcoded Api-Key,Secret,Token Etc..☆77Sep 3, 2022Updated 3 years ago