ItsIgnacioPortal / hacker-scoper
Automagically filter URLs with Bug Bounty program scope rules scraped from the internet.
☆28Updated 5 months ago
Alternatives and similar repositories for hacker-scoper
Users that are interested in hacker-scoper are comparing it to the libraries listed below
Sorting:
- Ffuf output browser☆39Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- My fuzz repo!☆22Updated last year
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆36Updated last year
- XSS scanning with Dalfox on Github-action☆25Updated last year
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Updated 3 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- Saves pages to Wayback machine☆13Updated 5 months ago
- Custom scripts for directory fuzzing, subdomain enumeration, and more.☆43Updated 3 years ago
- This includes all the templates of nuclei collected from different sources☆17Updated 2 years ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆62Updated 4 months ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated 10 months ago
- ☆9Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- This extension provides a way to discover NoSQL injection vulnerabilities.☆23Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2024-23897☆16Updated last year
- Related subdomains finder☆29Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆33Updated 4 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 3 years ago
- Attempt zone transfers on domains☆17Updated 3 years ago
- Creating a Database for Mass Recon☆12Updated 4 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆57Updated 3 years ago
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆23Updated 3 years ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆38Updated this week
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- Introduction to CYS4-SensitiveDiscoverer, a Burp extension that discovers sensitive information inside HTTP messages.☆20Updated 5 months ago
- A fingerprint generation helper for nuclei network templates☆72Updated 2 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆17Updated 2 years ago