alwalxed / juicyurls
CLI tool to scan URLs for suspicious keywords, extensions, paths, and hidden files.
☆45Updated 6 months ago
Alternatives and similar repositories for juicyurls
Users that are interested in juicyurls are comparing it to the libraries listed below
Sorting:
- CLI tool for fetching URLs from Wayback Machine, Common Crawl, and VirusTotal.☆35Updated 6 months ago
- ☆57Updated 3 weeks ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆90Updated 9 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆59Updated 2 months ago
- A passive way to find backups/ sensitive information.☆79Updated 2 weeks ago
- ai-based domain name generation☆91Updated 3 months ago
- Gather results of dorks across a number of search engines☆121Updated 3 weeks ago
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆89Updated 2 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆31Updated last year
- ☆91Updated last month
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆36Updated 10 months ago
- ☆119Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆112Updated 7 months ago
- Private Nuclei Templates☆99Updated 2 months ago
- A simple plugin to export JS files from one or multiple targets☆42Updated last year
- ☆70Updated 7 months ago
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆58Updated 6 months ago
- ☆148Updated 11 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆170Updated 7 months ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆138Updated last year
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.☆68Updated last month
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆54Updated 3 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆96Updated last month
- my nuclei templates☆39Updated last year
- ☆43Updated 4 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆49Updated 3 weeks ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆114Updated 5 months ago
- ☆106Updated last year
- ☆162Updated 6 months ago
- ☆68Updated last year