amolnaik4 / bodhiLinks
Bodhi - Client-side Vulnerability Playground
☆121Updated 4 years ago
Alternatives and similar repositories for bodhi
Users that are interested in bodhi are comparing it to the libraries listed below
Sorting:
- Files for appsecwiki.com☆120Updated 5 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 5 years ago
- XSS Hunter Burp Plugin☆150Updated 7 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159Updated last year
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- Damn Vulnerable eXtensive Training Environment☆108Updated 3 years ago
- DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.☆87Updated 6 years ago
- A simple framework for sending test payloads for known web CVEs.☆133Updated 4 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Updated last year
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆80Updated 3 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 8 years ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 7 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- A repository for GraphQL Extension for Burp Suite☆57Updated 7 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆140Updated 4 years ago
- Actarus is a custom tool for bug bounty☆77Updated 6 years ago
- Improved decoder for Burp Suite☆138Updated 4 years ago
- Various tools for managing bug bounty recon and exploration.☆48Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆109Updated last year
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆114Updated 6 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Updated 5 years ago
- vulnerable single sign on☆149Updated last year
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆165Updated 6 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆139Updated 5 years ago
- XSS Payloads☆49Updated 9 years ago
- ☆208Updated 4 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago