alwalxed / juicyurls
CLI tool to scan URLs for suspicious keywords, extensions, paths, and hidden files.
☆44Updated 4 months ago
Alternatives and similar repositories for juicyurls:
Users that are interested in juicyurls are comparing it to the libraries listed below
- CLI tool for fetching URLs from Wayback Machine, Common Crawl, and VirusTotal.☆35Updated 4 months ago
- A passive way to find backups/ sensitive information.☆72Updated 2 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆109Updated 5 months ago
- Private Nuclei Templates☆97Updated last month
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆89Updated 2 weeks ago
- ☆107Updated 2 weeks ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆87Updated 7 months ago
- Gather results of dorks across a number of search engines☆101Updated 4 months ago
- ☆147Updated 9 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆54Updated last month
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆94Updated 6 months ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 5 months ago
- my nuclei templates☆39Updated 11 months ago
- ☆58Updated 3 months ago
- A Powerful Recon Engine☆61Updated 4 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆55Updated last month
- ☆118Updated last year
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆87Updated 3 weeks ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆108Updated 3 months ago
- Bug Bounty Web and API Payloads☆34Updated 4 months ago
- ☆65Updated 6 months ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆136Updated last year
- ☆158Updated 5 months ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆35Updated last month
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆135Updated 5 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆58Updated 5 months ago
- ☆41Updated 2 months ago
- ☆104Updated last year
- Ultimate Wordlist for Web Content Discovery☆67Updated 4 months ago
- ☆103Updated last week