callforpapers-source / jsholeLinks
A JavaScript components vulnerability scanner, based on RetireJS
☆37Updated 5 years ago
Alternatives and similar repositories for jshole
Users that are interested in jshole are comparing it to the libraries listed below
Sorting:
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 5 years ago
- Offensive Security recon tool☆92Updated 4 years ago
- A tool written in python for scraping firebase data☆43Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- ☆47Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- Information-Gathering Shell Script☆30Updated 5 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Updated 6 years ago
- REST API backend for Reconmap☆47Updated this week
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆86Updated 2 years ago
- Another Subdomain ENumeration Tool☆12Updated 3 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- A python library to automate time-based blind SQL injection☆49Updated 6 years ago
- Enumerate a target Based off of Nmap Results☆78Updated 2 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- Shodan Port Scanner☆44Updated 5 years ago
- Turn your VPS into an attack box☆35Updated last year
- ⚡️ Multiple target ZAP Scanning☆105Updated last year
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆40Updated 2 years ago
- A python tool which runs to display random publicly disclosed Hackerone reports when bored. Automatically opens the report in browser.(Ad…☆42Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆71Updated 2 years ago