Lupin-Holmes / sandwichLinks
☆67Updated last year
Alternatives and similar repositories for sandwich
Users that are interested in sandwich are comparing it to the libraries listed below
Sorting:
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆139Updated 9 months ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆142Updated last year
- ☆135Updated 3 years ago
- ☆43Updated 6 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆178Updated 9 months ago
- Identify virtual hosts by similarity comparison☆126Updated 11 months ago
- A chrome/Firefox extension to retrieve and load react javascript chunks all at once for a wide range of javascript techs☆70Updated last month
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆90Updated 4 months ago
- Extract JavaScript files from burp suite project with ease.☆90Updated 3 years ago
- A path-normalization pentesting tool.☆128Updated last year
- Collection of scripts that I use while bug hunting☆49Updated 2 years ago
- Private Nuclei Templates☆100Updated 4 months ago
- JSSCM detects expired domains for Stored XSS exploitation during browsing.☆49Updated 3 months ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆41Updated last year
- ☆73Updated 9 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆37Updated last year
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆142Updated last year
- 🎉 CVE Monitor v1.0☆24Updated 2 weeks ago
- ☆32Updated last year
- Recon-Ninja☆88Updated last year
- Describe how to use ffuf different options with examples☆89Updated 2 years ago
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆37Updated 2 years ago
- ☆113Updated 2 years ago
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆100Updated last year
- ☆46Updated 2 years ago
- Ultimate Wordlist for Web Content Discovery☆68Updated 2 months ago
- ☆156Updated 2 years ago
- ☆145Updated 2 years ago
- PoC for leaking text nodes via CSS injection☆25Updated 11 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆145Updated 7 months ago