Header Exploitation HTTP
☆736May 8, 2026Updated last week
Alternatives and similar repositories for HExHTTP
Users that are interested in HExHTTP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI-powered ffuf wrapper☆776Dec 4, 2025Updated 5 months ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆314May 16, 2024Updated 2 years ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆845Updated this week
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆561Mar 8, 2025Updated last year
- web cache deception detect☆41Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A fast WordPress plugin enumeration tool☆837Apr 13, 2026Updated last month
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆300Oct 5, 2024Updated last year
- ai-based domain name generation☆140May 7, 2026Updated last week
- An IIS short filename enumeration tool☆1,160Nov 25, 2024Updated last year
- Gather results of dorks across a number of search engines☆336Apr 23, 2026Updated 3 weeks ago
- SubOwner - A Simple tool check for subdomain takeovers.☆117Oct 18, 2024Updated last year
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆938Aug 24, 2023Updated 2 years ago
- High-Performance JavaScript Security Scanner - Process 1M URLs in ~5 hours with Telegram & Discord bot integration, Docker support, and c…☆174Oct 18, 2025Updated 7 months ago
- jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice☆293Apr 9, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Automation tool to testing and confirm the xss vulnerability.☆308Jul 18, 2025Updated 10 months ago
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆794Dec 9, 2025Updated 5 months ago
- 「🔑」A tool used to hunt down API key leaks in JS files and pages☆893Mar 12, 2026Updated 2 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,835Apr 17, 2026Updated last month
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆758Dec 19, 2023Updated 2 years ago
- i will upload more templates here to share with the comunity.☆571Apr 17, 2024Updated 2 years ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆759Jan 25, 2026Updated 3 months ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆313Mar 31, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,341Aug 7, 2025Updated 9 months ago
- Hidden parameters discovery suite☆2,056Sep 8, 2024Updated last year
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,711Apr 12, 2026Updated last month
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆166Jul 2, 2024Updated last year
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆515Updated this week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,829May 22, 2024Updated last year
- CT Log Scanner☆536Dec 26, 2025Updated 4 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆387Nov 26, 2024Updated last year
- declutters url lists for crawling/pentesting☆1,555Feb 23, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automatic SSTI detection tool with interactive interface☆1,494Apr 25, 2026Updated 3 weeks ago
- Never forget where you inject.☆301Aug 15, 2025Updated 9 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆226Sep 25, 2025Updated 7 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆736Mar 21, 2024Updated 2 years ago
- A passive way to find backups/ sensitive information.☆92Jul 10, 2025Updated 10 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,473Jul 14, 2025Updated 10 months ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,554Mar 8, 2026Updated 2 months ago