bebiksior / Caido403Bypasser
403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.
☆61Updated 2 months ago
Alternatives and similar repositories for Caido403Bypasser:
Users that are interested in Caido403Bypasser are comparing it to the libraries listed below
- ☆40Updated 2 months ago
- ☆64Updated 5 months ago
- ♥☆99Updated 5 months ago
- ☆130Updated 3 years ago
- ☆57Updated 3 months ago
- Private Nuclei Templates☆97Updated 2 weeks ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆135Updated last year
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆140Updated last week
- Gather results of dorks across a number of search engines☆101Updated 3 months ago
- ☆101Updated this week
- my nuclei templates☆39Updated 10 months ago
- Ultimate Wordlist for Web Content Discovery☆67Updated 3 months ago
- 10,000 H1 Disclosed Reports☆107Updated 10 months ago
- ☆168Updated last month
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆168Updated 5 months ago
- ☆95Updated 2 years ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 4 months ago
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆163Updated last month
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆250Updated this week
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆36Updated 8 months ago
- ☆126Updated 3 years ago
- ☆60Updated 11 months ago
- ☆104Updated last year
- Automate Recon XSS Bug Bounty☆142Updated 2 weeks ago
- My custom created nuclei for SQLi, bugbounty, pentesting☆24Updated 5 months ago
- A curated list of Android Security materials and resources For Pentesters and Bug Hunters☆13Updated 4 years ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆36Updated 5 months ago
- ☆118Updated last year