brevityinmotion / goodfaithLinks
Stay within program scope
☆37Updated 3 years ago
Alternatives and similar repositories for goodfaith
Users that are interested in goodfaith are comparing it to the libraries listed below
Sorting:
- ☆95Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Basic implementation of certstream to print new subdomains and domains☆36Updated 4 years ago
- Python script to launch burp scans automatically☆31Updated 4 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- Ffuf output browser☆39Updated 2 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- ☆57Updated last year
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- Bcheck scripts for Burp☆28Updated last year
- Script for Bug Bounty☆29Updated 4 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆60Updated 2 years ago
- vīlicus is a bug bounty api dashboard☆41Updated 2 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 5 months ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆59Updated 3 years ago
- A simple utility to generate domain names with all possible TLDs☆24Updated 2 years ago
- ☆48Updated 4 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 8 months ago
- A collection of BBRF agents that can be deployed to AWS lambda☆23Updated 10 months ago
- Enhanced 403 bypass header☆21Updated 3 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆113Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- A BurpSuite plugin for BBRF☆25Updated 10 months ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- ☆90Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago