OWASP Foundation Web Respository
☆27Oct 11, 2025Updated 6 months ago
Alternatives and similar repositories for www-project-top-25-parameters
Users that are interested in www-project-top-25-parameters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11May 15, 2020Updated 5 years ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- ☆12Sep 23, 2023Updated 2 years ago
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- ☆210Jul 11, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- vīlicus is a bug bounty api dashboard☆41Aug 13, 2023Updated 2 years ago
- Copy as FFUF Command for Burp Suite☆10Jun 12, 2024Updated last year
- ☆16Apr 21, 2023Updated 3 years ago
- Clientside vulnerability / reflected xss fuzzer☆149Jul 29, 2023Updated 2 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆29Feb 29, 2016Updated 10 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆20May 3, 2024Updated 2 years ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🚀 Hyper-fast runtime for HTML, the programming language☆21Dec 9, 2023Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- stdin writes to slack☆13Feb 8, 2020Updated 6 years ago
- A Dark theme for VS Code☆13Apr 1, 2021Updated 5 years ago
- A cheatsheet for common JavaScript sources and sinks that lead to potential vulnerabilities.☆58Jun 13, 2023Updated 2 years ago
- Expand urls into one url for each path depth☆31Jul 29, 2020Updated 5 years ago
- The best Markdown editor or your money back.☆18Oct 30, 2025Updated 6 months ago
- Check IP addresses against known cloud provider IP address ranges☆48Feb 7, 2026Updated 3 months ago
- An AI-powered assistant for hackers and security professionals built for Caido☆35Jan 24, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆50May 22, 2025Updated 11 months ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- The original slurp source☆32Nov 25, 2018Updated 7 years ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆26Jan 13, 2025Updated last year
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Apr 4, 2024Updated 2 years ago
- A utility to quickly map IP addresses to their respective ASN☆20Aug 26, 2023Updated 2 years ago
- AIx is a cli tool to interact with Large Language Models (LLM) APIs.☆311Apr 20, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The official BBF university.☆10Oct 12, 2017Updated 8 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Jul 9, 2020Updated 5 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆91Feb 3, 2024Updated 2 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆50Nov 4, 2022Updated 3 years ago
- A curated GitHub repository that's in-scope and eligible for bounty.☆21Aug 10, 2022Updated 3 years ago