attacksurge / ax
The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbitrary binaries and scripts using any of our eight supported cloud providers!
☆334Updated last week
Alternatives and similar repositories for ax:
Users that are interested in ax are comparing it to the libraries listed below
- ☆467Updated 9 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆436Updated this week
- CT Log Scanner☆313Updated 3 weeks ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆585Updated 3 months ago
- AI-powered ffuf wrapper☆289Updated 2 months ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆229Updated last year
- ☆162Updated last week
- ☆164Updated 4 months ago
- ☆162Updated 7 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆622Updated last year
- Recon MindMap (RMM)☆150Updated 8 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆140Updated 2 weeks ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆318Updated last month
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆486Updated last week
- A streamlined tool for discovering private TLDs for security research.☆177Updated this week
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆205Updated 5 months ago
- De-clutter a list of URLs☆321Updated 3 months ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆234Updated last year
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆280Updated last year
- Discover new target domains using Content Security Policy☆394Updated this week
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆133Updated 2 months ago
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆523Updated this week
- ☆415Updated 3 weeks ago
- Search for sensitive data in Postman public library.☆197Updated last month
- Burp extension to create target specific and tailored wordlist from burp history.☆234Updated 3 years ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆162Updated 4 months ago
- jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice☆264Updated 10 months ago
- ☆197Updated 9 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆304Updated 3 months ago
- Distribute ordinary bash commands over many systems☆161Updated 2 years ago