bbhunter / vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
☆12Updated 3 years ago
Alternatives and similar repositories for vajra:
Users that are interested in vajra are comparing it to the libraries listed below
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Updated 3 years ago
- ☆24Updated 4 years ago
- Burpsuite Plugin to detect Directory Traversal vulnerabilities☆28Updated 3 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated 9 months ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Updated 4 years ago
- Alias for storing ffuf results☆20Updated 4 years ago
- ☆25Updated 5 years ago
- Wordlists for Bug Bounty☆25Updated 5 years ago
- A collection of scripts for bug-bounty related stuff☆38Updated 4 years ago
- A powerful Burp extension to make bounty rain☆14Updated 3 years ago
- A BurpSuite plugin for BBRF☆24Updated 4 months ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Updated 2 years ago
- Shodan Favicon Hash Generator By Aziz Hakim @eternyle☆25Updated 10 months ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- ☆18Updated 3 years ago
- ☆38Updated 4 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Updated 4 years ago
- ☆33Updated 3 years ago
- ☆15Updated 4 years ago
- A simple utility to generate domain names with all possible TLDs☆23Updated 2 years ago
- ☆42Updated 3 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆27Updated 4 years ago
- Subvenkon is a subdomain enumerator from Venkon☆23Updated 4 years ago
- ☆11Updated 4 years ago
- ☆14Updated 3 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Updated 3 years ago
- ☆13Updated 3 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆9Updated 4 years ago
- Tool to find stored robots.txt files from the past☆17Updated last year
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆16Updated 4 years ago