amolnaik4 / bodhiLinks
Bodhi - Client-side Vulnerability Playground
☆121Updated 4 years ago
Alternatives and similar repositories for bodhi
Users that are interested in bodhi are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable eXtensive Training Environment☆106Updated 3 years ago
- Files for appsecwiki.com☆119Updated 5 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆158Updated last year
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆81Updated 2 years ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 7 years ago
- Various tools for managing bug bounty recon and exploration.☆48Updated 2 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Updated last year
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- XSS Hunter Burp Plugin☆150Updated 7 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Notes/Tools for pentesting☆81Updated last year
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆114Updated 6 years ago
- Tools to gather subdomains from Bug Bounty programs☆65Updated 7 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- Database of websites for penetration testing☆177Updated 5 years ago
- Actarus is a custom tool for bug bounty☆77Updated 5 years ago
- XSS Payloads☆49Updated 9 years ago
- Burp Suite Extensions☆129Updated 12 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- CTF Write-ups☆26Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆106Updated last year
- A Python3 based single-file subdomain enumerator☆90Updated 6 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- Some scripts and exploits☆147Updated 7 years ago
- DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.☆88Updated 6 years ago