PortSwigger / param-minerLinks
☆1,386Updated last month
Alternatives and similar repositories for param-miner
Users that are interested in param-miner are comparing it to the libraries listed below
Sorting:
- ☆1,153Updated 3 weeks ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,020Updated last year
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,237Updated last year
- Burp plugin able to find reflected XSS on page in real-time while browsing on site☆1,180Updated 4 years ago
- Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.☆1,660Updated last week
- The XSS Hunter service - a portable version of XSSHunter.com☆1,534Updated 2 years ago
- DNSGen is a powerful and flexible DNS name permutation tool designed for security researchers and penetration testers. It generates intel…☆1,024Updated 9 months ago
- XSS payloads designed to turn alert(1) into P1☆1,379Updated 2 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,756Updated last year
- List of XSS Vectors/Payloads☆1,335Updated 9 months ago
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,369Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,440Updated last year
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆1,111Updated 3 months ago
- A wordlist of API names for web application assessments☆851Updated 4 months ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,557Updated last year
- Automated & Manual Wordlists provided by Assetnote☆1,550Updated this week
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,244Updated 8 months ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,337Updated 4 years ago
- ☆685Updated 3 years ago
- A cheatsheet for exploiting server-side SVG processors.☆774Updated 5 years ago
- Fetch many paths for many hosts - without killing the hosts☆1,685Updated last year
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆912Updated 3 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,167Updated last week
- A Powerful Subdomain Takeover Tool☆960Updated 2 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,452Updated 9 months ago
- Subdomain Takeover tool written in Go☆2,007Updated 2 years ago
- Fetches javascript file from a list of URLS or subdomains.☆808Updated 3 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆994Updated last year
- A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.☆729Updated last year
- Making Favicon.ico based Recon Great again !☆1,233Updated 2 years ago