cure53 / HTTPLeaksLinks
HTTPLeaks - All possible ways, a website can leak HTTP requests
☆2,061Updated last year
Alternatives and similar repositories for HTTPLeaks
Users that are interested in HTTPLeaks are comparing it to the libraries listed below
Sorting:
- HTML5 Security Cheatsheet - A collection of HTML5 related XSS attack vectors☆2,907Updated 3 years ago
- A curated list of the most common and most interesting robots.txt disallowed directories.☆1,472Updated 3 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,532Updated 2 years ago
- A container repository for my public web hacks!☆2,010Updated 3 years ago
- Welcome to the XSS Challenge Wiki!☆1,591Updated 5 years ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,452Updated 3 months ago
- This tool can be used to brute discover GET and POST parameters☆1,381Updated 6 years ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,091Updated 3 years ago
- ☆730Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,449Updated 9 months ago
- ☆2,287Updated last year
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,731Updated last year
- Command line utility for searching and downloading exploits☆1,783Updated last month
- ☆1,378Updated last month
- DNS Enumeration Script☆2,872Updated this week
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,469Updated 3 years ago
- Sleepy Puppy XSS Payload Management Framework☆1,047Updated 7 years ago
- A collection of browser-based side channel attack vectors.☆754Updated last year
- A DNS rebinding attack framework.☆1,193Updated last week
- Subdomain Takeover tool written in Go☆2,004Updated 2 years ago
- Software to identify the different types of hashes -☆1,424Updated 3 years ago
- A proposed standard that allows websites to define security policies.☆1,838Updated 2 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆2,068Updated last year
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆847Updated 8 months ago
- A repository with 3 tools for pwn'ing websites with .git repositories available☆4,088Updated 2 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,437Updated last year
- ☆1,151Updated 3 weeks ago
- Setup script for Regon-ng☆935Updated 4 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆656Updated 3 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,023Updated 4 years ago