R0X4R / bhedak
A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.
☆105Updated 3 years ago
Alternatives and similar repositories for bhedak:
Users that are interested in bhedak are comparing it to the libraries listed below
- ☆158Updated last year
- ☆154Updated 2 years ago
- A path-normalization pentesting tool.☆126Updated last year
- Responser☆53Updated 3 years ago
- Nuclei Templates - Here you will find the templates I use while hunting☆117Updated 3 years ago
- ☆78Updated 2 years ago
- ☆139Updated 2 years ago
- ☆95Updated 3 years ago
- Community curated list of template files for the nuclei engine to find security vulnerability and fingerprinting the targets.☆62Updated last year
- ☆113Updated 2 years ago
- Enumerate Subdomains Through Google Dorks (Bypassed Page Filter)☆123Updated last month
- A fast tool to scan SAAS,PAAS App written in Go☆84Updated 2 years ago
- Simple tool to gather domains from crt.sh using the organization name☆100Updated 3 years ago
- Identify virtual hosts by similarity comparison☆119Updated 8 months ago
- The project aims at creating target-specific wordlists for any web application that you are testing.☆66Updated 2 years ago
- ☆126Updated 3 years ago
- Tips For Bug Bounty Hunters☆85Updated 2 years ago
- Extract JavaScript files from burp suite project with ease.☆89Updated 3 years ago
- ☆87Updated 3 years ago
- ☆76Updated last year
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆92Updated 3 years ago
- ☆59Updated 3 years ago
- ☆133Updated 3 years ago
- Find subdomains on GitLab.☆98Updated last year
- A tool for append URLs, skipping duplicates/paths & combine parameters.☆121Updated 3 years ago
- Make URL path combinations using a wordlist☆174Updated last year
- Prototype Pollution Scanner☆115Updated 4 years ago
- The scripts I write to help me on my bug bounty hunting☆121Updated 3 years ago
- A collection of useful grep patterns and tools by Tomnomnom for extracting specific values from text.☆45Updated last month
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆138Updated last year