devploit / debugHunterLinks
Discover hidden debugging parameters and uncover web application secrets
☆244Updated last year
Alternatives and similar repositories for debugHunter
Users that are interested in debugHunter are comparing it to the libraries listed below
Sorting:
- Opensource assets and vulnerability scanning tool☆185Updated 4 months ago
- Self-hosted passive subdomain continous monitoring tool.☆167Updated last year
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆219Updated this week
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆177Updated 9 months ago
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆101Updated 6 months ago
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆284Updated 2 years ago
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆170Updated 2 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆197Updated 2 months ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆244Updated 6 months ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆140Updated 2 years ago
- Make URL path combinations using a wordlist☆171Updated 2 years ago
- Search for sensitive data in Postman public library.☆213Updated last month
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆118Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆166Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆306Updated last year
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆295Updated 2 years ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆255Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆185Updated last year
- ☆157Updated 3 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆149Updated last month
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆163Updated 10 months ago
- Identify virtual hosts by similarity comparison☆129Updated last year
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆75Updated 2 years ago
- Custom scan profiles for use with Burp Suite Pro☆144Updated last year
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆131Updated 3 years ago
- A burp suite extension that reviews backup, old, temporary and unreferenced files on web server for sensitive information (OWASP WSTG-CON…☆161Updated last year
- 403-bypass tool to bypass 403 responses.☆119Updated 2 years ago
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆184Updated last week
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆190Updated 3 years ago