davtur19 / DotGit
An extension for checking if .git is exposed in visited websites
☆389Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for DotGit
- Yet another tool to dump a git repository from a website, focused on as-complete-as-possible dumps and handling weird edge-cases.☆582Updated 7 months ago
- Content-Type Research☆540Updated 9 months ago
- ☆365Updated 3 years ago
- Scrape domain names from SSL certificates of arbitrary hosts☆620Updated 7 months ago
- Free, libre, effective, and data-driven wordlists for all!☆550Updated 3 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆835Updated last month
- A Firefox Web Extension to improve the discovery of DOM XSS.☆261Updated last week
- Making Favicon.ico based Recon Great again !☆1,128Updated last year
- "Can I take over DNS?" — a list of DNS providers and how to claim vulnerable domains.☆989Updated 2 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆941Updated 10 months ago
- Small tool to Grab subdomains using Shodan api.☆362Updated 3 weeks ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆553Updated last year
- ☆359Updated 6 months ago
- The most exhaustive list of reliable DNS resolvers.☆690Updated last week
- IPFuscator - A tool to automatically generate alternative IP representations☆352Updated 10 months ago
- Automated learning of regexes for DNS discovery☆358Updated last year
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆320Updated 3 years ago
- A tool to inspect and attack version 1 GUIDs☆206Updated 2 years ago
- Tool to bypass 403/40X response codes.☆1,112Updated 3 months ago
- Rust-based high performance domain permutation generator.☆275Updated 11 months ago
- ☆528Updated 11 months ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆227Updated 2 years ago
- HTTP/2 Single Packet Attack low Level Library / Tool based on Scapy + Exploit Timing Attacks☆143Updated 2 weeks ago
- A Security Tool for Enumerating WebSockets☆334Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆845Updated 10 months ago
- A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.☆670Updated 6 months ago
- Subdomain finder☆362Updated 5 months ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆329Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆457Updated 2 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆232Updated 2 years ago