Net-hunter121 / API-WordlistLinks
☆248Updated 4 years ago
Alternatives and similar repositories for API-Wordlist
Users that are interested in API-Wordlist are comparing it to the libraries listed below
Sorting:
- Useful "Match and Replace" burpsuite rules☆349Updated last year
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆273Updated 3 months ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆366Updated 2 years ago
- Automatic Bug finder with buprsuite☆166Updated 2 years ago
- XSS payloads for bypassing WAF. This repository is updating continuously.☆248Updated last year
- Automated Tool for Testing Header Based Blind SQL Injection☆284Updated 2 years ago
- A comprehensive list of custom filters for Logger++ to identify various vulnerabilities in different API styles☆223Updated 10 months ago
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆298Updated last year
- Never forget where you inject.☆261Updated 3 weeks ago
- Smart context-based SSRF vulnerability scanner.☆356Updated 3 years ago
- A collection oneliner scripts for bug bounty☆180Updated last year
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆383Updated 2 years ago
- jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice☆283Updated last year
- i will upload more templates here to share with the comunity.☆554Updated last year
- My Priv8 Nuclei Templates☆326Updated last year
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆215Updated last year
- ☆127Updated 4 years ago
- ☆135Updated 10 months ago
- ☆138Updated 3 years ago
- A subdomain fuzzing tool☆168Updated last year
- Describe how to use ffuf different options with examples☆89Updated 2 years ago
- ☆156Updated 2 years ago
- All Type of Payloads☆136Updated last year
- ☆117Updated 2 years ago
- ☆301Updated 2 years ago
- Finding XSS during recon☆261Updated 3 years ago
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆138Updated 7 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆277Updated 11 months ago
- ☆164Updated 2 years ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆154Updated 6 months ago