carlospolop / fuzzhttpbypass
This tool use fuuzzing to try to bypass unknown authentication methods, who knows...
☆243Updated 6 months ago
Alternatives and similar repositories for fuzzhttpbypass:
Users that are interested in fuzzhttpbypass are comparing it to the libraries listed below
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆244Updated last week
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆350Updated last year
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆351Updated 4 years ago
- Local File Inclusion discovery and exploitation tool☆283Updated 2 months ago
- ☆235Updated 3 years ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆239Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆465Updated 2 years ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆381Updated last year
- Burp extension to create target specific and tailored wordlist from burp history.☆237Updated 3 years ago
- ☆151Updated last year
- Burpsuite plugin for Interact.sh☆213Updated 8 months ago
- List of reporting templates I have used since I started doing BBH.☆249Updated 5 months ago
- Customisable and automated HTTP header injection☆244Updated 8 months ago
- Describe how to use ffuf different options with examples☆84Updated 2 years ago
- De-clutter a list of URLs☆326Updated 3 months ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆490Updated this week
- Smart context-based SSRF vulnerability scanner.☆348Updated 2 years ago
- Automated Tool for Testing Header Based Blind SQL Injection☆271Updated last year
- Automated tool for domains & subdomains gathering☆184Updated last year
- My Priv8 Nuclei Templates☆307Updated 9 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆306Updated 3 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆133Updated 2 months ago
- Useful "Match and Replace" burpsuite rules☆342Updated last year
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆347Updated this week
- ☆155Updated last year
- ☆129Updated 3 years ago
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆195Updated 7 months ago
- Enumerate / Dump Docker Registry☆172Updated 10 months ago
- Finding XSS during recon☆255Updated 2 years ago
- ☆286Updated 2 years ago