amolnaik4 / bodhiLinks
Bodhi - Client-side Vulnerability Playground
☆120Updated 4 years ago
Alternatives and similar repositories for bodhi
Users that are interested in bodhi are comparing it to the libraries listed below
Sorting:
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆158Updated last year
- Resolve and quickly portscan a list of (sub)domains.☆86Updated 8 years ago
- Burp Suite extension to discover assets from HTTP response.☆227Updated 5 months ago
- Damn Vulnerable eXtensive Training Environment☆105Updated 3 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- Files for appsecwiki.com☆117Updated 4 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Updated last year
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆137Updated 5 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- Notes/Tools for pentesting☆82Updated last year
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 6 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 5 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 7 years ago
- ☆162Updated 7 years ago
- A lab for playing with NoSQL Injection☆131Updated 4 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f …☆160Updated 3 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Updated 5 years ago
- HTML5 WebSocket message fuzzer☆146Updated 6 years ago
- subdomain bruteforce list☆101Updated 8 months ago
- Improved decoder for Burp Suite☆137Updated 3 years ago