A tool to perform Sequential Import Chaining
☆289Sep 11, 2019Updated 6 years ago
Alternatives and similar repositories for sic
Users that are interested in sic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CSS injection vulnerability in Swagger UI☆35Oct 22, 2019Updated 6 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆660Feb 1, 2025Updated last year
- A collection of browser-based side channel attack vectors.☆759Mar 19, 2024Updated 2 years ago
- A simple SSRF-testing sheriff written in Go☆337Oct 31, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- secretz, minimizing the large attack surface of Travis CI☆325May 30, 2022Updated 3 years ago
- ☆26Feb 16, 2021Updated 5 years ago
- Burp Suite Extension to monitor new scope☆200Mar 31, 2021Updated 5 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆104Feb 11, 2019Updated 7 years ago
- ☆705Nov 27, 2024Updated last year
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Prototype Pollution and useful Script Gadgets☆1,612Jan 27, 2024Updated 2 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- Automatic tool for DNS rebinding-based SSRF attacks☆305Aug 21, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Continuous monitoring for JavaScript files☆221Dec 29, 2019Updated 6 years ago
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,306Jan 26, 2024Updated 2 years ago
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆1,030Feb 5, 2021Updated 5 years ago
- A permutation generation tool written in golang☆211Jul 15, 2019Updated 6 years ago
- A tool to bruteforce nameservers when working with subdomain delegations to AWS.☆58Aug 22, 2019Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆99Dec 30, 2019Updated 6 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆697Jul 4, 2022Updated 3 years ago
- Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)☆459May 10, 2019Updated 6 years ago
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆93Aug 27, 2019Updated 6 years ago
- ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight☆219Apr 10, 2022Updated 4 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆348Nov 20, 2022Updated 3 years ago
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆66Apr 25, 2025Updated last year
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆301Feb 12, 2023Updated 3 years ago
- Quickly Search Large DNS Datasets☆585Dec 21, 2020Updated 5 years ago
- Apache Solr Injection Research☆581Jan 28, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Research on GraphQL from an AppSec point of view.☆417May 24, 2023Updated 2 years ago
- Match and Replace script used to automatically generate JSON option file to BurpSuite☆215May 13, 2019Updated 6 years ago
- Second-order subdomain takeover scanner☆402Mar 29, 2026Updated last month
- exploit for ImageMagick's uninitialized memory disclosure in gif coder☆284Jul 22, 2017Updated 8 years ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆391Aug 15, 2024Updated last year
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 6 months ago
- List DTDs and generate XXE payloads using those local DTDs.☆655Feb 21, 2024Updated 2 years ago