ShutdownRepo / httpmethods
HTTP verb tampering & methods enumeration
☆52Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for httpmethods
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆52Updated 3 weeks ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆69Updated 10 months ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆80Updated last year
- Script for Bug Bounty☆28Updated 3 years ago
- An MS Sharepoint and Frontpage Auditing Tool☆44Updated this week
- Prototype Pollution Scanner☆101Updated 3 years ago
- Resolvers updated daily for reconftw☆46Updated last year
- Striping CDN IPs from a list of IP Addresses☆74Updated 2 years ago
- The fastest way to setup XSSHunter. It has options for the official and Discord/Slack Forks☆40Updated 8 months ago
- ☆52Updated 6 months ago
- Custom scan profiles for use with Burp Suite Pro☆105Updated 8 months ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆77Updated last year
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆42Updated 8 months ago
- A Go tool that gets the newest PRs from projectdiscovery/nuclei-templates.☆53Updated last year
- A Burp Suite plugin/extension that offers a shell in Burp. Both useful for OS Command injection and LFI exploration☆77Updated 4 years ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆128Updated 2 months ago
- HTTP parameter discovery suite.☆60Updated 4 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆51Updated 3 years ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆36Updated last year
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆48Updated 2 years ago
- ☆68Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- ☆64Updated last year
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆27Updated 9 months ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- IIS shortname scanner + bruteforce☆49Updated 9 months ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆39Updated 5 months ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆55Updated last year
- Extract JavaScript files from burp suite project with ease.☆78Updated 2 years ago