M359AH / DepFineLinks
DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE
☆28Updated 3 years ago
Alternatives and similar repositories for DepFine
Users that are interested in DepFine are comparing it to the libraries listed below
Sorting:
- ☆34Updated 3 years ago
- ☆16Updated 2 weeks ago
- My own Custom nuclei templates☆25Updated 3 years ago
- Some wordlists collected form github to all bug bounty hunters.☆34Updated 4 years ago
- Authorization-Nuclei-Templates☆40Updated 10 months ago
- ☆81Updated 2 years ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆48Updated 2 years ago
- IIS shortname scanner + bruteforce☆53Updated last year
- Automated blind-xss search for Burp Suite☆23Updated 3 years ago
- ☆7Updated 2 years ago
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆37Updated 2 years ago
- Stay on the beat with SubHound - receive notifications for new subdomains on Telegram and Discord! 🐶🎵☆17Updated 2 years ago
- Simple tool to gather domains from crt.sh using the organization name☆100Updated 3 years ago
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆29Updated last year
- basic bbtools , buggy , not recommended to use☆35Updated 6 months ago
- An opensource tool built to help bug bounty hunters and developers to easily/quickly find the perfect command to validate API keys☆13Updated 3 months ago
- Some of the gf patterns which i use☆44Updated 3 years ago
- Burp-suite Extension For finding .map files☆50Updated last year
- Tool for testing reflections in the HTTP responses☆60Updated 2 years ago
- ☆28Updated last year
- A fast tool to scan SAAS,PAAS App written in Go☆84Updated 2 years ago
- ☆95Updated 3 years ago
- Downlaod all the nuclei Templates created from many Bug Hunters☆27Updated 2 years ago
- ☆21Updated 2 years ago
- A simple plugin to export JS files from one or multiple targets☆43Updated last year
- This is a comprehensive Subdomain Enumeration Guide that traces back to my GitBook.☆31Updated 4 months ago
- This PoC showcases how an attacker can exploit a CSRF vulnerability to upload a file to a victim's account without their knowledge. The a…☆10Updated last year
- ☆40Updated 3 years ago
- Find secret keys from JS file☆52Updated 2 years ago
- ☆46Updated 2 years ago