PalindromeLabs / STEWS
A Security Tool for Enumerating WebSockets
☆343Updated 3 years ago
Alternatives and similar repositories for STEWS:
Users that are interested in STEWS are comparing it to the libraries listed below
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆626Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆466Updated 2 years ago
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆515Updated 3 months ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆503Updated 2 years ago
- ☆377Updated last year
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆241Updated last week
- Web dashboard for Interactsh client☆207Updated this week
- HTTP Request Smuggling Detection Tool☆491Updated last year
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆243Updated 7 months ago
- A fast and minimal JS endpoint extractor☆341Updated 4 months ago
- Automated learning of regexes for DNS discovery☆364Updated 2 years ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆63Updated 10 months ago
- Customisable and automated HTTP header injection☆243Updated 9 months ago
- Smart context-based SSRF vulnerability scanner.☆349Updated 2 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆346Updated last year
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆961Updated 2 months ago
- Golang client for querying SecurityTrails API data☆546Updated last year
- ☆427Updated 2 months ago
- Discover new target domains using Content Security Policy☆399Updated last week
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆439Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆861Updated last year
- Generate tens of thousands of subdomain combinations in a matter of seconds☆264Updated last year
- Local File Inclusion discovery and exploitation tool☆293Updated 2 months ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆374Updated 3 years ago
- Burpsuite plugin for Interact.sh☆216Updated 9 months ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆367Updated this week
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆353Updated last year
- ☆518Updated last year
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology…☆611Updated 3 months ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆317Updated 2 months ago