Discover web technologies in web applications from your terminal
☆55Nov 18, 2021Updated 4 years ago
Alternatives and similar repositories for wappy
Users that are interested in wappy are comparing it to the libraries listed below
Sorting:
- Related subdomains finder☆28May 18, 2022Updated 3 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- ☆30Jun 27, 2022Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆33Jun 19, 2021Updated 4 years ago
- A tool to make socks connections through HTTP agents☆719Mar 30, 2021Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 6 months ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- A collection of tools for debugging Windows application crashes.☆18Nov 24, 2022Updated 3 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- Burp extension to generate multi-step CSRF POC.☆31Sep 23, 2019Updated 6 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- Fast Endpoint Scanner☆55Dec 23, 2020Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆57Oct 28, 2020Updated 5 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆173Nov 17, 2021Updated 4 years ago
- Vulnerability scanner for Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 3 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- 通过域名或备案号,查询备案信息中的所有域名☆15Jun 28, 2023Updated 2 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆33Jun 28, 2022Updated 3 years ago
- ☆139Mar 29, 2023Updated 2 years ago
- RDP Checker☆64Feb 23, 2024Updated 2 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆66Aug 29, 2023Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- Web Application Firewall (WAF) Detector☆35Mar 13, 2023Updated 2 years ago
- ☆31Apr 25, 2021Updated 4 years ago
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆12Jun 28, 2021Updated 4 years ago
- JSON CSRF PoC☆14Aug 1, 2020Updated 5 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated 2 weeks ago
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Jun 23, 2024Updated last year
- Burp Extension that copies a request and builds a FFUF skeleton☆113Sep 29, 2023Updated 2 years ago