PortSwigger / param-miner
☆1,298Updated 2 weeks ago
Alternatives and similar repositories for param-miner:
Users that are interested in param-miner are comparing it to the libraries listed below
- ☆972Updated last month
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆987Updated last month
- Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.☆1,561Updated this week
- SSRF (Server Side Request Forgery) testing resources☆2,385Updated 4 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,708Updated 9 months ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,512Updated 2 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,379Updated last month
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆1,896Updated last year
- Fetch many paths for many hosts - without killing the hosts☆1,625Updated last year
- A Powerful Subdomain Takeover Tool☆939Updated last year
- Burp plugin able to find reflected XSS on page in real-time while browsing on site☆1,140Updated 4 years ago
- XSS payloads designed to turn alert(1) into P1☆1,349Updated last year
- DNSGen is a powerful and flexible DNS name permutation tool designed for security researchers and penetration testers. It generates intel…☆948Updated last month
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,489Updated last year
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,259Updated 5 months ago
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,085Updated last year
- List of XSS Vectors/Payloads☆1,214Updated last month
- Subdomain Takeover tool written in Go☆1,940Updated last year
- A wordlist of API names for web application assessments☆787Updated 2 years ago
- Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists☆710Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆3,826Updated 10 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆846Updated 3 years ago
- Automated HTTP Request Repeating With Burp Suite☆864Updated 3 years ago
- This tool can be used to brute discover GET and POST parameters☆1,361Updated 5 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,178Updated 2 weeks ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,067Updated 2 months ago
- A small tool that extracts relative URLs from a file.☆742Updated 4 years ago
- Automated & Manual Wordlists provided by Assetnote☆1,380Updated 6 months ago
- Making Favicon.ico based Recon Great again !☆1,155Updated last year
- ☆802Updated last year