callforpapers-source / jshole
A JavaScript components vulnerability scanner, based on RetireJS
☆36Updated 4 years ago
Alternatives and similar repositories for jshole:
Users that are interested in jshole are comparing it to the libraries listed below
- ☆47Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- An Extended, Modulair, Host Discovery Framework☆43Updated 6 years ago
- Reconnaisance Tool☆11Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- Another Subdomain ENumeration Tool☆11Updated 2 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆21Updated 4 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 4 years ago
- Passive subdomain enumeration tool with http-probe.☆33Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Updated 5 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 8 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 4 years ago
- A simple tool to detect wildcards domain based on Amass's wildcards detector.☆64Updated 4 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆27Updated 5 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- Security test tool for Blind XSS☆26Updated 5 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated 11 months ago
- XXE Injection Payloads☆28Updated 5 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 6 years ago
- Get all possible href | src | url from target url or domain☆41Updated 4 years ago
- Turn your VPS into an attack box☆34Updated last year
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago