bugbountyhunters / Iris-JS
#JavascriptRecon #bugbounty
☆21Updated 3 years ago
Alternatives and similar repositories for Iris-JS:
Users that are interested in Iris-JS are comparing it to the libraries listed below
- Automated blind-xss search for Burp Suite☆23Updated 2 years ago
- ☆27Updated last year
- ☆33Updated 3 years ago
- Some wordlists collected form github to all bug bounty hunters.☆27Updated 3 years ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Updated 3 years ago
- All About BB☆13Updated 4 years ago
- ☆44Updated 3 years ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆47Updated 2 years ago
- ☆14Updated 3 years ago
- Burp-suite Extension For finding .map files☆45Updated last year
- ☆39Updated 3 years ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆11Updated 3 years ago
- ☆42Updated 3 years ago
- Magic Header Blind Xss tool (deliver blind xss payloads in request headers).☆27Updated 3 years ago
- My gfPatterns☆15Updated 3 years ago
- ☆18Updated 2 years ago
- ☆15Updated 4 years ago
- Basic Bash Script to scrape all subdomains from crtsh in a single run☆18Updated 2 years ago
- ☆60Updated 3 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Updated 2 weeks ago
- API research and learning☆12Updated 5 years ago
- Bash Script to Hunt all the targets/Subdomains from Chaos by Project Discovery Team☆35Updated 4 years ago
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Updated 3 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆58Updated 3 years ago
- ☆94Updated 3 years ago
- ☆34Updated 4 years ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆33Updated 3 years ago
- ☆25Updated 4 years ago
- Burpsuite Plugin to detect Directory Traversal vulnerabilities☆28Updated 3 years ago
- ☆33Updated 2 years ago