blue1616 / monolithLinks
☆20Updated 3 years ago
Alternatives and similar repositories for monolith
Users that are interested in monolith are comparing it to the libraries listed below
Sorting:
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- A fingerprint generation helper for nuclei network templates☆73Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- Introduction to CYS4-SensitiveDiscoverer, a Burp extension that discovers sensitive information inside HTTP messages.☆20Updated 7 months ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆29Updated 2 years ago
- ☆30Updated last year
- Web CTF CheatSheet 🐈☆34Updated 6 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆12Updated last year
- Burp Extension that lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap☆36Updated 3 years ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆62Updated 6 months ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 5 months ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- FireProx written in Go☆20Updated last year
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- ☆26Updated 3 years ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 3 years ago
- ☆36Updated 5 months ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆17Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆57Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- A selection of rebuilt and from scratch exploits, scripts and ideas that can be used in red-teaming scenarios.☆5Updated last year
- ☆17Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- Application for logging HTTP and DNS Requests☆14Updated 4 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year