MrMax4o4 / KeysKitLinks
An opensource tool built to help bug bounty hunters and developers to easily/quickly find the perfect command to validate API keys
☆13Updated 3 months ago
Alternatives and similar repositories for KeysKit
Users that are interested in KeysKit are comparing it to the libraries listed below
Sorting:
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆28Updated 3 years ago
- ☆16Updated 2 weeks ago
- IIS shortname scanner + bruteforce☆53Updated last year
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆41Updated last year
- It grep subdomains, email/username, build custom wordlist etc from gau results☆48Updated 2 years ago
- ☆34Updated 3 years ago
- PoC for leaking text nodes via CSS injection☆25Updated last year
- A simple plugin to export JS files from one or multiple targets☆43Updated last year
- Some wordlists collected form github to all bug bounty hunters.☆34Updated 4 years ago
- Authorization-Nuclei-Templates☆40Updated 10 months ago
- Some of the gf patterns which i use☆44Updated 3 years ago
- Burp-suite Extension For finding .map files☆50Updated last year
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆42Updated 2 years ago
- ☆17Updated 9 months ago
- ☆40Updated 3 years ago
- Cool HackerOne Reports☆22Updated 2 years ago
- A Burp Extension that makes it easier to view all script code on a Response.☆16Updated last year
- Automated blind-xss search for Burp Suite☆23Updated 3 years ago
- ☆81Updated 2 years ago
- Simple Automation script for juniper cve-2023-36845☆17Updated last year
- basic bbtools , buggy , not recommended to use☆35Updated 6 months ago
- This Python script automates the process of identifying vulnerabilities in Firebase configurations extracted from APK files.☆44Updated 4 months ago
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆52Updated last year
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆29Updated last year
- ☆19Updated last year
- JSSCM detects expired domains for Stored XSS exploitation during browsing.☆49Updated 4 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Updated 4 years ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆53Updated 5 months ago
- web cache deception detect☆29Updated 2 months ago
- ☆47Updated last month