cramppet / dank
a deterministic finite automata ranker
☆70Updated 3 years ago
Alternatives and similar repositories for dank:
Users that are interested in dank are comparing it to the libraries listed below
- Determine the running software version of a remote F5 BIG-IP management interface.☆66Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- ☆35Updated 2 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 7 months ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 3 months ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆110Updated 3 years ago
- Burp Extension that lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap☆36Updated 3 years ago
- Utility for creating ZipSlip archives☆72Updated 2 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆71Updated last year
- Dump all available paths and/or endpoints on WADL file.☆94Updated this week
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- ☆94Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated last year
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- ☆165Updated 3 years ago
- ☆33Updated 3 weeks ago
- ☆44Updated 4 years ago
- ☆55Updated 2 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated 2 months ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆24Updated last year
- ☆26Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- A simple tool to detect vulnerabilities described here https://portswigger.net/research/browser-powered-desync-attacks.☆36Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆27Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated 2 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆50Updated 10 months ago