Plazmaz / leaky-repo
Benchmarking repo for secrets scanning
☆231Updated 7 months ago
Alternatives and similar repositories for leaky-repo:
Users that are interested in leaky-repo are comparing it to the libraries listed below
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆220Updated 2 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆284Updated 2 months ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆152Updated 2 years ago
- Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.☆148Updated 4 years ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆300Updated 2 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆258Updated 3 years ago
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆145Updated 11 months ago
- A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for…☆190Updated 4 years ago
- A simple SSRF-testing sheriff written in Go☆324Updated 4 months ago
- Burp Suite Extension to monitor new scope☆196Updated 3 years ago
- vulnerable single sign on☆147Updated 7 months ago
- secretz, minimizing the large attack surface of Travis CI☆325Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated last year
- Burp Suite extension to discover assets from HTTP response.☆223Updated 2 months ago
- Recursive DNS Subdomain Enumerator with dead-end avoidance system (BETA)☆144Updated 3 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆338Updated 4 years ago
- Simple shell script for automated domain recognition with some tools☆299Updated 4 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆256Updated 2 years ago
- Pentest/BugBounty progress control with scanning modules☆281Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆101Updated last year
- Push notifications for passive DNS data☆108Updated 8 years ago
- Automatic tool for DNS rebinding-based SSRF attacks☆298Updated 4 years ago
- A tool to find sensitive keys and passwords in Travis logs☆141Updated 3 years ago
- Everything you need about Burp Extension Generation☆152Updated 2 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 4 years ago
- Parse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in …☆199Updated last year
- a .js scanner, built in php. designed to scrape urls and other info☆213Updated 7 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆172Updated 3 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆273Updated 4 years ago