bcdannyboy / CVE-2023-44487
Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487
☆223Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2023-44487
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆336Updated last year
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆225Updated 3 weeks ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆317Updated 11 months ago
- Community curated list of search queries for various products across multiple search engines.☆137Updated this week
- 🕵️ Pinkerton is an JavaScript file crawler and secret finder tool developed in Python☆281Updated 9 months ago
- Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆194Updated this week
- Text4Shell scanner for Burp Suite☆190Updated 2 years ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆308Updated 6 months ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆255Updated 8 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆532Updated 3 weeks ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆274Updated last year
- Never forget where you inject.☆211Updated last year
- This repository presents a proof-of-concept of CVE-2023-7028☆235Updated 10 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆326Updated last month
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆477Updated last month
- Session Hijacking Visual Exploitation☆193Updated 8 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆380Updated 3 months ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆227Updated last year
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆196Updated 2 months ago
- Discover new target domains using Content Security Policy☆381Updated this week
- Web dashboard for Interactsh client☆194Updated 2 weeks ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆336Updated this week
- 「🔑」A tool used to hunt down API key leaks in JS files and pages☆575Updated 3 months ago
- A streamlined tool for discovering TLDs, associated domains, and related domain names.☆140Updated this week
- Nuclei templates for honeypots detection.☆192Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆532Updated 10 months ago
- ☆193Updated 5 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆345Updated 11 months ago
- Local File Inclusion discovery and exploitation tool☆223Updated last month
- The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.☆188Updated 2 months ago