devanshbatham / headerpwnLinks
A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers
☆354Updated last year
Alternatives and similar repositories for headerpwn
Users that are interested in headerpwn are comparing it to the libraries listed below
Sorting:
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆297Updated 2 years ago
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆250Updated 9 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆383Updated 2 years ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆387Updated 6 months ago
- Opensource assets and vulnerability scanning tool☆185Updated 5 months ago
- unleashed ffuf☆226Updated 2 weeks ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆366Updated 11 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated last month
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆452Updated 3 years ago
- Discover new target domains using Content Security Policy☆492Updated last week
- ☆218Updated last year
- Local File Inclusion discovery and exploitation tool☆330Updated 10 months ago
- Automated Tool for Testing Header Based Blind SQL Injection☆289Updated 2 years ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆708Updated last month
- ☆205Updated 9 months ago
- A streamlined tool for discovering private TLDs for security research.☆225Updated this week
- The Most Advanced Client-Side Prototype Pollution Scanner☆241Updated 3 weeks ago
- AI-powered ffuf wrapper☆549Updated 11 months ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆308Updated last year
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆217Updated last year
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆150Updated 2 months ago
- Self-hosted passive subdomain continous monitoring tool.☆168Updated last year
- Search for sensitive data in Postman public library.☆216Updated 2 months ago
- ☆172Updated 3 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆372Updated 2 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆379Updated last year
- Recon MindMap (RMM)☆163Updated last year
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆307Updated last year
- Smart context-based SSRF vulnerability scanner.☆360Updated 3 years ago
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆559Updated last month