SuprDewd / unfolderLinks
Automated tool for discovering hidden files and directories hosted on HTTP servers
☆11Updated 7 years ago
Alternatives and similar repositories for unfolder
Users that are interested in unfolder are comparing it to the libraries listed below
Sorting:
- PoC for an adaptive parallelised DNS prober☆109Updated 3 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 8 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- Actarus is a custom tool for bug bounty☆77Updated 6 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- "What To" guide for finding vulnerabilities in sites.☆21Updated 8 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 11 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆166Updated 6 years ago
- ❄️ Research project for SubFinder core API V2☆34Updated 7 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 9 years ago
- ☆182Updated 12 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆169Updated 9 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Updated 8 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Reconnaissance scripts for penetration testing☆59Updated 10 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 5 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 5 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 8 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Updated 7 years ago
- Stay on top of new domains! Bug bounty hunters can use this tool to receive Pushbullet notifications each time there is a new target subd…☆26Updated 7 years ago
- Advanced XPath Injection Tool☆33Updated last week
- Exploit insecure crossdomain.xml files.☆26Updated 8 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 7 years ago
- Web Application Security☆130Updated last month
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago