cure53 / HTTPLeaks
HTTPLeaks - All possible ways, a website can leak HTTP requests
☆2,008Updated 3 months ago
Alternatives and similar repositories for HTTPLeaks:
Users that are interested in HTTPLeaks are comparing it to the libraries listed below
- HTML5 Security Cheatsheet - A collection of HTML5 related XSS attack vectors☆2,869Updated 2 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,512Updated 2 years ago
- A container repository for my public web hacks!☆1,973Updated 2 years ago
- Welcome to the XSS Challenge Wiki!☆1,580Updated 4 years ago
- ☆2,237Updated last year
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,379Updated last month
- ☆1,298Updated 2 weeks ago
- SSRF (Server Side Request Forgery) testing resources☆2,385Updated 4 months ago
- A curated list of the most common and most interesting robots.txt disallowed directories.☆1,443Updated 2 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,868Updated 10 months ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,256Updated last month
- ☆716Updated 2 years ago
- Subdomain Takeover tool written in Go☆1,940Updated last year
- A DNS rebinding attack framework.☆1,062Updated 3 weeks ago
- This tool can be used to brute discover GET and POST parameters☆1,361Updated 5 years ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,732Updated this week
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,399Updated 3 years ago
- Discover Your Attack Surface!☆1,374Updated 2 years ago
- A collection of browser-based side channel attack vectors.☆745Updated 11 months ago
- Awesome XSS stuff☆4,856Updated 3 months ago
- HTTP parameter discovery suite.☆5,439Updated 2 months ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆1,979Updated 2 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,742Updated 3 years ago
- A Tool for Domain Flyovers☆5,714Updated 2 years ago
- ☆972Updated last month
- DNS Enumeration Script☆2,712Updated last week
- Command line utility for searching and downloading exploits☆1,749Updated 8 months ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,672Updated this week
- grep rough audit - source code auditing tool☆1,581Updated 2 months ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,030Updated 2 weeks ago