denandz / sourcemapperLinks
Extract JavaScript source trees from Sourcemap files
☆1,219Updated last year
Alternatives and similar repositories for sourcemapper
Users that are interested in sourcemapper are comparing it to the libraries listed below
Sorting:
- Obtain GraphQL API schema even if the introspection is disabled☆1,297Updated 2 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,661Updated last year
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆934Updated 9 months ago
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,237Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,242Updated 2 months ago
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆712Updated this week
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,557Updated last year
- Prototype Pollution and useful Script Gadgets☆1,536Updated last year
- An IIS short filename enumeration tool☆1,020Updated 11 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,338Updated 3 months ago
- Extract uncompiled, uncompressed SPA code from Webpack source maps.☆533Updated 3 years ago
- ☆1,039Updated last month
- declutters url lists for crawling/pentesting☆1,455Updated 8 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆994Updated last year
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology…☆687Updated 4 months ago
- bypass-url-parser☆1,097Updated this week
- Hidden parameters discovery suite☆1,933Updated last year
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,415Updated 2 weeks ago
- A tool to fastly get all javascript sources/files☆836Updated 3 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆912Updated 3 years ago
- Content-Type Research☆639Updated 4 months ago
- ☆1,386Updated 2 months ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,364Updated 4 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆964Updated last year
- The most exhaustive list of reliable DNS resolvers.☆881Updated last week
- Burp Suite extension that mutates ciphers to bypass TLS-fingerprint based bot detection☆377Updated last month
- Fast and customizable subdomain wordlist generator using DSL☆874Updated last month
- "Can I take over DNS?" — a list of DNS providers and how to claim vulnerable domains.☆1,061Updated 7 months ago
- ☆517Updated 2 weeks ago
- A cheatsheet for exploiting server-side SVG processors.☆774Updated 5 years ago