Net-hunter121 / API-WordlistLinks
☆245Updated 4 years ago
Alternatives and similar repositories for API-Wordlist
Users that are interested in API-Wordlist are comparing it to the libraries listed below
Sorting:
- Useful "Match and Replace" burpsuite rules☆348Updated last year
- Automatic Bug finder with buprsuite☆166Updated 2 years ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆274Updated last month
- A comprehensive list of custom filters for Logger++ to identify various vulnerabilities in different API styles☆224Updated 8 months ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆364Updated last year
- XSS payloads for bypassing WAF. This repository is updating continuously.☆245Updated last year
- Smart context-based SSRF vulnerability scanner.☆353Updated 3 years ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆381Updated 2 years ago
- Automated Tool for Testing Header Based Blind SQL Injection☆282Updated last year
- jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice☆274Updated last year
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆214Updated last year
- A collection oneliner scripts for bug bounty☆179Updated last year
- ☆133Updated 8 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆178Updated 9 months ago
- Never forget where you inject.☆257Updated 2 years ago
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆289Updated last year
- i will upload more templates here to share with the comunity.☆550Updated last year
- ☆135Updated 3 years ago
- ☆300Updated 2 years ago
- My Priv8 Nuclei Templates☆321Updated last year
- ☆113Updated 2 years ago
- ☆156Updated 2 years ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆147Updated 4 months ago
- ☆127Updated 3 years ago
- A subdomain fuzzing tool☆166Updated last year
- All Type of Payloads☆136Updated last year
- Finding XSS during recon☆260Updated 2 years ago
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆129Updated 5 months ago
- List of reporting templates I have used since I started doing BBH.☆307Updated 9 months ago
- 10,000 H1 Disclosed Reports☆111Updated last year