Small tool to log HTTP requests for debugging.
☆16May 9, 2020Updated 5 years ago
Alternatives and similar repositories for request-logger
Users that are interested in request-logger are comparing it to the libraries listed below
Sorting:
- ☆18Apr 26, 2021Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Jan 3, 2021Updated 5 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Oct 25, 2019Updated 6 years ago
- ☆26Feb 16, 2021Updated 5 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- URL Screenshot Utility☆28May 22, 2023Updated 2 years ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Jun 30, 2023Updated 2 years ago
- Party Protocol Contracts for code4rena contest☆13Nov 25, 2023Updated 2 years ago
- Automatic detection of hashing algorithms☆20Jun 18, 2016Updated 9 years ago
- ☆10Dec 2, 2023Updated 2 years ago
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- Docker image that provides features similar to Burp Collaborator☆15Mar 6, 2021Updated 5 years ago
- List of configuration files from WEB-INF and META-INF for use in Unvalidated Forwards and JSP Include vulnerabilities.☆84Mar 23, 2018Updated 7 years ago
- WS-Security message-level security for SOAP (signing and encryption)☆11Oct 19, 2017Updated 8 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆77Dec 29, 2019Updated 6 years ago
- ☆14Jun 27, 2024Updated last year
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- ☆16Aug 11, 2017Updated 8 years ago
- ☆10Mar 8, 2024Updated 2 years ago
- ☆14Jun 22, 2022Updated 3 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Sample demo for creating an Azure File Share using AKS.☆12Jun 6, 2021Updated 4 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- ☆36Sep 12, 2020Updated 5 years ago
- ☆11May 5, 2015Updated 10 years ago
- Airflow 2.0 configuration with Celery Executor based on Docker containers with Postgres and Redis broker plus Flower and Webserver UI☆15May 13, 2021Updated 4 years ago
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆147Apr 12, 2024Updated last year
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Tools for GitHub issue and milestone consolidation across projects.☆63May 27, 2015Updated 10 years ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for…☆192Sep 6, 2020Updated 5 years ago
- All about subdomain enumeration☆16Feb 5, 2019Updated 7 years ago
- A library for crawling websites☆15Jun 29, 2018Updated 7 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- ☆10Aug 8, 2015Updated 10 years ago