devploit / debugHunterLinks
Discover hidden debugging parameters and uncover web application secrets
☆246Updated 2 years ago
Alternatives and similar repositories for debugHunter
Users that are interested in debugHunter are comparing it to the libraries listed below
Sorting:
- Opensource assets and vulnerability scanning tool☆186Updated 2 weeks ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆143Updated 2 years ago
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆169Updated 3 years ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆179Updated 3 weeks ago
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆101Updated 3 months ago
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆230Updated last week
- Search for sensitive data in Postman public library.☆214Updated 5 months ago
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆81Updated 2 years ago
- Self-hosted passive subdomain continous monitoring tool.☆170Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆174Updated 3 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆120Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆311Updated last year
- Make URL path combinations using a wordlist☆169Updated 2 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆186Updated 2 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆203Updated 2 weeks ago
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆287Updated 2 years ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆165Updated last year
- ☆173Updated 5 months ago
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Updated last year
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆246Updated 10 months ago
- Custom scan profiles for use with Burp Suite Pro☆151Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated 2 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆132Updated 3 years ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Updated 2 years ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Updated 4 months ago
- Distribute ordinary bash commands over many systems☆168Updated 3 years ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆119Updated 2 years ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆160Updated 5 months ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆257Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆83Updated 2 years ago