The-Login / DNS-Reset-CheckerView external linksLinks
Tools to assess the DNS security of web applications
☆127Oct 5, 2022Updated 3 years ago
Alternatives and similar repositories for DNS-Reset-Checker
Users that are interested in DNS-Reset-Checker are comparing it to the libraries listed below
Sorting:
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Tools to assess DNS security.☆153Mar 2, 2024Updated last year
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆62Aug 5, 2022Updated 3 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- Extract domains/subdomains/FQDNs from files and URLs☆19Jun 30, 2020Updated 5 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 3 years ago
- Http request smuggling vulnerability scanner☆229Aug 11, 2022Updated 3 years ago
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆13Jun 28, 2021Updated 4 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- Collection of tools to interact with Intigriti website☆16Aug 10, 2024Updated last year
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- A tool to inspect and attack version 1 GUIDs☆239Oct 13, 2022Updated 3 years ago
- tool that generates bypasses for open redirects☆52Apr 18, 2022Updated 3 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- Related subdomains finder☆29May 18, 2022Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Nov 19, 2020Updated 5 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆946Dec 31, 2021Updated 4 years ago
- Fetch web pages using headless Chrome, storing all fetched resources including JavaScript files. Run arbitrary JavaScript on many web pag…☆528Apr 23, 2025Updated 9 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆64Dec 21, 2024Updated last year
- Go scripts for checking API key / access token validity☆220Aug 3, 2021Updated 4 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆661Feb 1, 2025Updated last year
- Script to test open Akamai ARL vulnerability.☆70Aug 11, 2021Updated 4 years ago
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Jul 31, 2020Updated 5 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Prototype Pollution and useful Script Gadgets☆1,581Jan 27, 2024Updated 2 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆445Sep 7, 2022Updated 3 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆778May 10, 2022Updated 3 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆187Oct 30, 2021Updated 4 years ago
- ☆561Mar 27, 2025Updated 10 months ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆294Sep 2, 2025Updated 5 months ago
- Client Side Prototype Pollution Scanner☆524Sep 17, 2022Updated 3 years ago
- DupeKeyInjector☆135Apr 16, 2022Updated 3 years ago