☆63Mar 1, 2023Updated 3 years ago
Alternatives and similar repositories for rebindMultiA
Users that are interested in rebindMultiA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,297Aug 7, 2025Updated 7 months ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆44Sep 22, 2024Updated last year
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆779Dec 9, 2025Updated 3 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Dec 9, 2024Updated last year
- Useful scripts for tampermonkey that I used during bug hunting. Will be updated "au fil de l'eau"☆17Jun 2, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆755Dec 19, 2023Updated 2 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Dec 10, 2022Updated 3 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 8 months ago
- Downlaod all the nuclei Templates created from many Bug Hunters☆29May 25, 2023Updated 2 years ago
- Extract JavaScript files from burp suite project with ease.☆97Feb 19, 2022Updated 4 years ago
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- PoC for XSS in org.webjars:swagger-ui [3.14.2, 3.36.2]☆51Feb 17, 2023Updated 3 years ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆161Feb 11, 2026Updated last month
- ☆144Mar 10, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Fetch Javascript sourcemaps, bounty hunter style☆42May 21, 2023Updated 2 years ago
- Fetches JavaScript files quickly and comprehensively.☆133May 8, 2023Updated 2 years ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆228Feb 6, 2025Updated last year
- This script is used to automatically start/stop ec2 instance to match target ip in aws ip pool to takeover subdomain..☆17Oct 8, 2023Updated 2 years ago
- Chrome extension for automating CSPT discovery☆138Mar 9, 2026Updated 2 weeks ago
- Unicode characters that will translate a single character to multiple characters in domain names or TLD's☆50Nov 23, 2024Updated last year
- ☆28Jul 9, 2024Updated last year
- A fancier postMessage tracker with Chrome Manifest version V3 support and a few additional features, inspired by Frans Rosens postmessage…☆123Sep 12, 2025Updated 6 months ago
- IIS shortname scanner written in Go☆355Mar 25, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Unofficial documentation for the great tool Param Miner☆184Aug 21, 2022Updated 3 years ago
- This repository contains a number of insecure self-hosted applications that allows interested security engineers to test vulnerabilities …☆26Apr 30, 2025Updated 10 months ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆141Sep 16, 2024Updated last year
- ☆80Mar 26, 2024Updated 2 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆562Mar 8, 2025Updated last year
- ☆170Oct 4, 2021Updated 4 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆180Aug 23, 2025Updated 7 months ago
- Some useful test data or payloads☆25Oct 30, 2021Updated 4 years ago
- ☆14Dec 13, 2021Updated 4 years ago
- 🗂 Knowledge Base on the Security of Chromium Extensions (https://extensions.neplox.security)☆21Jan 24, 2025Updated last year
- ☆148Dec 23, 2022Updated 3 years ago
- Content-Type Research☆659Jun 29, 2025Updated 8 months ago
- Digging into private data through Sonarcloud public projects☆11Sep 13, 2024Updated last year