OWASP Foundation Web Respository
☆26Oct 11, 2025Updated 6 months ago
Alternatives and similar repositories for www-project-top-25-parameters
Users that are interested in www-project-top-25-parameters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- ☆212Jul 11, 2024Updated last year
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- vīlicus is a bug bounty api dashboard☆41Aug 13, 2023Updated 2 years ago
- Copy as FFUF Command for Burp Suite☆10Jun 12, 2024Updated last year
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆19May 3, 2024Updated last year
- OAuth Security Cheatsheet☆40May 12, 2014Updated 11 years ago
- Clientside vulnerability / reflected xss fuzzer☆149Jul 29, 2023Updated 2 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆29Feb 29, 2016Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- 🚀 Hyper-fast runtime for HTML, the programming language☆21Dec 9, 2023Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- stdin writes to slack☆13Feb 8, 2020Updated 6 years ago
- A Dark theme for VS Code☆13Apr 1, 2021Updated 5 years ago
- A cheatsheet for common JavaScript sources and sinks that lead to potential vulnerabilities.☆58Jun 13, 2023Updated 2 years ago
- Expand urls into one url for each path depth☆31Jul 29, 2020Updated 5 years ago
- Check IP addresses against known cloud provider IP address ranges☆47Feb 7, 2026Updated 2 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆49May 22, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The best Markdown editor or your money back.☆18Oct 30, 2025Updated 5 months ago
- An AI-powered assistant for hackers and security professionals built for Caido☆33Jan 24, 2026Updated 2 months ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆26Jan 13, 2025Updated last year
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Apr 4, 2024Updated 2 years ago
- A utility to quickly map IP addresses to their respective ASN☆20Aug 26, 2023Updated 2 years ago
- AIx is a cli tool to interact with Large Language Models (LLM) APIs.☆312Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The official BBF university.☆10Oct 12, 2017Updated 8 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆50Nov 4, 2022Updated 3 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate☆209Jun 25, 2024Updated last year
- bash script for automating subdomain enumeration process either passive or active☆30Feb 24, 2026Updated last month