dariusztytko / token-reverser
Words list generator to crack security tokens
☆109Updated 4 years ago
Alternatives and similar repositories for token-reverser:
Users that are interested in token-reverser are comparing it to the libraries listed below
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆138Updated 5 years ago
- Everything you need about Burp Extension Generation☆152Updated 2 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆92Updated 2 years ago
- Various Payload wordlists☆234Updated 4 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆90Updated 6 years ago
- Repo of useful scripts☆104Updated 4 years ago
- XSS Hunter Burp Plugin☆149Updated 6 years ago
- A place to store my own wordlists, and link to others that are useful☆106Updated last year
- subdomain bruteforce list☆100Updated 3 months ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆156Updated 3 years ago
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆102Updated 4 years ago
- A collection of scripts to extend Burp Suite☆139Updated 5 years ago
- Burp with Friends☆100Updated last year
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 6 years ago
- HTTP parameter discovery suite.☆94Updated 4 years ago
- Piper Burp Suite Extender plugin☆115Updated 10 months ago
- BurpSuite extension to inject custom cross-site scripting payloads on every form/request submitted to detect blind XSS vulnerabilities☆109Updated last year
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆133Updated last year
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆78Updated 5 years ago
- ☆147Updated 2 years ago
- Scripts to extract files from SCM directories left on web servers☆35Updated last year
- ☆29Updated 3 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆77Updated 5 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆42Updated last year
- The Outlook HTML Leak Test Project☆41Updated 6 years ago
- ☆121Updated 7 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated last year