cure53 / HTTPLeaks
HTTPLeaks - All possible ways, a website can leak HTTP requests
☆2,019Updated 5 months ago
Alternatives and similar repositories for HTTPLeaks:
Users that are interested in HTTPLeaks are comparing it to the libraries listed below
- HTML5 Security Cheatsheet - A collection of HTML5 related XSS attack vectors☆2,873Updated 3 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,514Updated 2 years ago
- A container repository for my public web hacks!☆1,984Updated 2 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,394Updated 2 months ago
- ☆2,253Updated last year
- A curated list of the most common and most interesting robots.txt disallowed directories.☆1,452Updated 2 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,083Updated last month
- A collection of browser-based side channel attack vectors.☆745Updated last year
- This tool can be used to brute discover GET and POST parameters☆1,364Updated 5 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,766Updated 3 years ago
- Reconnaissance tool for GitHub organizations☆6,014Updated 2 years ago
- A DNS rebinding attack framework.☆1,072Updated 2 weeks ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,897Updated 11 months ago
- Welcome to the XSS Challenge Wiki!☆1,581Updated 4 years ago
- Command line utility for searching and downloading exploits☆1,755Updated 9 months ago
- SSRF (Server Side Request Forgery) testing resources☆2,394Updated 5 months ago
- Subdomain Takeover tool written in Go☆1,952Updated last year
- ☆978Updated 2 months ago
- A Tool for Domain Flyovers☆5,735Updated 2 years ago
- HTTP parameter discovery suite.☆5,528Updated last month
- ☆1,308Updated last month
- DNS Enumeration Script☆2,733Updated last week
- A python script that finds endpoints in JavaScript files☆3,870Updated 11 months ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆2,010Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,225Updated 5 months ago
- Pop shells like a master.☆1,453Updated 5 years ago
- File upload vulnerability scanner and exploitation tool.☆3,181Updated last year
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,668Updated 7 months ago
- Web application fuzzer☆6,120Updated 7 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,033Updated 8 months ago