OlivierLaflamme / Auditing-VulnerabilitiesLinks
In this repository I'll host my research and methodologies for auditing vulnerabilities
☆29Updated 5 years ago
Alternatives and similar repositories for Auditing-Vulnerabilities
Users that are interested in Auditing-Vulnerabilities are comparing it to the libraries listed below
Sorting:
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆91Updated 6 years ago
- ☆60Updated last year
- Misc bounty and vulndisc things☆86Updated 4 years ago
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆103Updated 5 years ago
- A collection of simple tools and poc-builders☆39Updated 2 months ago
- Burp Bounty profiles☆83Updated 3 years ago
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆38Updated 4 months ago
- Messy BurpSuite plugin for SQL Truncation vulnerabilities.☆63Updated 5 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆110Updated 3 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Updated 3 months ago
- ☆48Updated 4 years ago
- All known and unknown public POC's for wordpress themes and plugins☆78Updated 4 years ago
- Expand urls into one url for each path depth☆33Updated 5 years ago
- AWS,AZURE,GOOGLE CLOUD IP CIDRS☆50Updated 3 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- A simple tool to detect wildcards domain based on Amass's wildcards detector.☆65Updated 4 years ago
- Extract relative urls from a heap snapshot☆87Updated 4 years ago
- ☆30Updated 3 years ago
- ☆76Updated 4 years ago
- A simple Swagger-ui scanner that can detect old versions vulnerable to various XSS attacks☆60Updated 6 years ago
- ☆37Updated 5 years ago
- A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!☆88Updated 5 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆37Updated last year
- ☆24Updated 4 years ago
- ☆44Updated 4 years ago
- a tool that compiles a csv of all h1 program stats☆47Updated 2 years ago
- Wordlist to bruteforce for LFI☆126Updated 6 years ago
- SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibil…☆155Updated 5 years ago
- unicode abnormalizer to takes a unicode string and abnormalizes it by character replacment☆26Updated 5 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆43Updated last month