Net-hunter121 / API-WordlistLinks
☆249Updated 4 years ago
Alternatives and similar repositories for API-Wordlist
Users that are interested in API-Wordlist are comparing it to the libraries listed below
Sorting:
- Useful "Match and Replace" burpsuite rules☆353Updated 2 years ago
- Automatic Bug finder with buprsuite☆166Updated 2 years ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆275Updated this week
- XSS payloads for bypassing WAF. This repository is updating continuously.☆257Updated last year
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆369Updated 2 years ago
- A collection oneliner scripts for bug bounty☆180Updated last year
- A comprehensive list of custom filters for Logger++ to identify various vulnerabilities in different API styles☆231Updated last year
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆382Updated 2 years ago
- Never forget where you inject.☆292Updated 3 months ago
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆217Updated last year
- My Priv8 Nuclei Templates☆330Updated last year
- ☆129Updated 4 years ago
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆301Updated last year
- Smart context-based SSRF vulnerability scanner.☆361Updated 3 years ago
- ☆136Updated last year
- jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice☆287Updated last year
- Automated Tool for Testing Header Based Blind SQL Injection☆295Updated 2 years ago
- i will upload more templates here to share with the comunity.☆561Updated last year
- Finding XSS during recon☆268Updated 3 years ago
- ☆173Updated 2 weeks ago
- All Type of Payloads☆137Updated last year
- A subdomain fuzzing tool☆169Updated last year
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆286Updated last year
- Go script for bypassing 403 forbidden☆158Updated 4 years ago
- ☆157Updated 2 years ago
- ☆302Updated 2 years ago
- Automated tool for domains & subdomains gathering☆190Updated 2 years ago
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆138Updated 9 months ago
- ☆146Updated 4 years ago
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆183Updated 9 months ago