cybervelia / graphicatorLinks
A GraphQL enumeration and extraction tool
☆131Updated 2 years ago
Alternatives and similar repositories for graphicator
Users that are interested in graphicator are comparing it to the libraries listed below
Sorting:
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆182Updated 2 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆95Updated last year
- ☆166Updated 3 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆182Updated last year
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆174Updated 8 months ago
- a deterministic finite automata ranker☆71Updated 3 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆115Updated last year
- Burp Extension that copies a request and builds a FFUF skeleton☆111Updated last year
- ☆105Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆53Updated 3 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆162Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆74Updated last year
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆176Updated 6 months ago
- A collection of utilities for building extensions using Burp's Montoya API☆50Updated last year
- Execute Trickest workflows right from your terminal☆92Updated 2 weeks ago
- 🔭 Collection of regexp pattern for security passive scanning☆114Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆128Updated last year
- ☆76Updated last year
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- Obtain GraphQL API schema despite disabled introspection!☆68Updated 4 years ago
- ☆57Updated last year
- Find CVE PoCs on GitHub☆147Updated last year
- Workshop given at Hack in Paris 2019☆122Updated 2 years ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆138Updated last month
- ☆94Updated 3 years ago
- Run all your bug bounty VPN profiles in parallel and expose them via multiple local SOCKS proxies.☆107Updated 3 years ago