N0MoreSecr3ts / wraith-signatures
Signatures for wraith used to detect secrets across various sources
☆15Updated 2 years ago
Alternatives and similar repositories for wraith-signatures:
Users that are interested in wraith-signatures are comparing it to the libraries listed below
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Updated 4 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 3 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆17Updated 4 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 4 years ago
- Jast (Just Another Screenshot Tool)☆10Updated 5 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- ☆10Updated 6 years ago
- Query various sources for CVE proof-of-concepts☆49Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- ☆34Updated last month
- ☆12Updated 3 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- Extract subdomains from rapiddns.io☆23Updated 2 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- ☆22Updated 3 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- Simple proxy which applies filters (default or custom) to your requests and responses, while you browse a website.☆8Updated 3 years ago
- Secrets detection based on regular expressions.☆23Updated 2 years ago
- ☆24Updated 4 years ago
- ☆11Updated 2 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Updated 4 years ago
- ☆36Updated 4 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- View screenshots as a slideshow over http☆15Updated 4 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago