Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.
☆120Dec 29, 2025Updated 2 months ago
Alternatives and similar repositories for supabase-exposure-check
Users that are interested in supabase-exposure-check are comparing it to the libraries listed below
Sorting:
- Rust-powered HTTP Request Smuggling Scanner.☆104Updated this week
- Detection Script for MongoBleed Exploitation☆76Jan 2, 2026Updated last month
- Adobe Experience Manager (AEM) hacking toolkit☆107Sep 26, 2025Updated 5 months ago
- ☆42Aug 12, 2025Updated 6 months ago
- ☆210Feb 17, 2026Updated last week
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆40Updated this week
- A simple tool to help you discover admin panels on websites.☆32Jul 25, 2025Updated 7 months ago
- Detection for CVE-2025-68613☆28Dec 22, 2025Updated 2 months ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- web cache deception detect☆38Jan 9, 2026Updated last month
- Bypass Reset Password Code Lead to Account Takeover☆26Sep 16, 2024Updated last year
- this is a tool to detect the Web service is ok or not☆23Oct 14, 2020Updated 5 years ago
- ☆150Feb 17, 2026Updated last week
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 9 months ago
- URILoot is a browser extension designed for Bug Bounty Hunters and Pentesters. Makes fetching uris easy from various sources.☆49Feb 15, 2026Updated 2 weeks ago
- List of Fresh DNS resolvers updates every 1 hour☆19Updated this week
- A comprehensive toolkit for ethical security testing of Cross-Site Scripting (XSS) vulnerabilities. Features a CLI tool for automated pay…☆16Jan 23, 2026Updated last month
- Javascript file change monitoring☆17Nov 11, 2025Updated 3 months ago
- ☆59Sep 8, 2025Updated 5 months ago
- My-custom-sensitive-info-disclsure-nuclei-template☆30Jan 3, 2026Updated last month
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- the POC of package.json RCE☆26Jun 24, 2025Updated 8 months ago
- ☆12Aug 24, 2025Updated 6 months ago
- A tool to slice URLs into directory levels☆19Jan 16, 2026Updated last month
- Collection of scripts and tools used during bug bounty work. This will be the location of my automation scripts created for my own person…☆138Dec 18, 2025Updated 2 months ago
- ☆15Feb 6, 2025Updated last year
- Parseltongue 3.1 - LLM Payload Crafter for AI safety research☆74Nov 14, 2025Updated 3 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆122Sep 10, 2025Updated 5 months ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆83Jun 11, 2025Updated 8 months ago
- ☆33Feb 22, 2026Updated last week
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆52Jul 17, 2025Updated 7 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆56Feb 2, 2025Updated last year
- ☆28Nov 3, 2024Updated last year
- ☆477Aug 21, 2025Updated 6 months ago
- ☆42Feb 22, 2026Updated last week
- Seamless AI Integration into Caido☆42Feb 20, 2026Updated last week
- FOFA 图形化采集工具☆23Apr 28, 2022Updated 3 years ago
- Scans remote JavaScript files with Trufflehog + Semgrep to detect leaked secrets☆137Jan 21, 2025Updated last year