blacklanternsecurity / badsecretsLinks
A library for detecting known secrets across many web frameworks
☆753Updated last week
Alternatives and similar repositories for badsecrets
Users that are interested in badsecrets are comparing it to the libraries listed below
Sorting:
- Local File Inclusion discovery and exploitation tool☆330Updated 11 months ago
- ☆542Updated last year
- A python script to scan for Apache Tomcat server vulnerabilities.☆884Updated last month
- PDF Files for Pentesting☆672Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆85Updated last year
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆420Updated last week
- An IIS short filename enumeration tool☆1,051Updated last year
- ☆523Updated 2 years ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆714Updated last month
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆937Updated 2 years ago
- ☆530Updated last month
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆738Updated 2 years ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆398Updated last week
- Fast and customizable subdomain wordlist generator using DSL☆902Updated 2 weeks ago
- A Security Tool for Enumerating WebSockets☆362Updated 3 years ago
- reverse shell using curl☆473Updated last year
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆531Updated last year
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆732Updated last year
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆282Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆658Updated 2 months ago
- Smart context-based SSRF vulnerability scanner.☆362Updated 3 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆416Updated 7 months ago
- A simple tool for bypassing file upload restrictions.☆889Updated last year
- ☆594Updated this week
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,032Updated 4 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆972Updated last year
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆885Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆699Updated 2 years ago
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆569Updated 3 months ago
- bypass-url-parser☆1,105Updated last week