OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently
☆12Feb 19, 2021Updated 5 years ago
Alternatives and similar repositories for reflect
Users that are interested in reflect are comparing it to the libraries listed below
Sorting:
- A BurpSuite plugin for BBRF☆25Nov 17, 2024Updated last year
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- Want to execute command repeatedly without workache? Here is shloop born for it!☆11Mar 2, 2022Updated 3 years ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆13Apr 26, 2023Updated 2 years ago
- ☆13Feb 14, 2022Updated 4 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- This repo includes my analysis of some public reports.☆55Sep 22, 2020Updated 5 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- Database interaction layer to store the Open Asset Model in a database management system☆21Feb 20, 2026Updated last week
- ☆18Oct 4, 2020Updated 5 years ago
- Some Templates for Bash Scripting☆17Sep 30, 2022Updated 3 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- ☆38Aug 12, 2020Updated 5 years ago
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆87May 6, 2023Updated 2 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Nov 10, 2025Updated 3 months ago
- Resolvers updated daily for reconftw☆47Feb 7, 2023Updated 3 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Nov 20, 2021Updated 4 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆25Sep 7, 2025Updated 5 months ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- ☆25Feb 11, 2024Updated 2 years ago
- Extract domains/subdomains from URLs en masse☆138Jul 8, 2023Updated 2 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- A curated GitHub repository that's in-scope and eligible for bounty.☆21Aug 10, 2022Updated 3 years ago
- DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.☆86Jun 3, 2019Updated 6 years ago
- Recon Custom WordList Ganerator☆58Jul 2, 2020Updated 5 years ago
- R3C0Nizer is the first ever CLI based menu-driven web application B-Tier recon framework.☆152Apr 2, 2021Updated 4 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Aug 1, 2018Updated 7 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Jul 4, 2023Updated 2 years ago
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Jul 14, 2017Updated 8 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- ☆63Jul 23, 2024Updated last year
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Jul 23, 2020Updated 5 years ago