Discover hidden debugging parameters and uncover web application secrets
☆248Feb 4, 2026Updated 3 months ago
Alternatives and similar repositories for debugHunter
Users that are interested in debugHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆376Jul 25, 2023Updated 2 years ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆890May 3, 2023Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆143Jun 27, 2023Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆91Sep 12, 2023Updated 2 years ago
- 「🔑」A tool used to hunt down API key leaks in JS files and pages☆893Mar 12, 2026Updated 2 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆167Oct 28, 2025Updated 6 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆92May 2, 2024Updated 2 years ago
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆586Sep 25, 2025Updated 7 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,829May 22, 2024Updated last year
- jsubfinder searches webpages for javascript & analyzes them for hidden subdomains and secrets (wip).☆279Jan 15, 2025Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,080Mar 24, 2026Updated last month
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆89Dec 29, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Apr 18, 2024Updated 2 years ago
- Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.☆311Jul 15, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- A Go tool that gets the newest PRs from projectdiscovery/nuclei-templates.☆55Jun 13, 2023Updated 2 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,511Jan 8, 2026Updated 4 months ago
- Resolvers updated daily for reconftw☆49Feb 7, 2023Updated 3 years ago
- Self-hosted passive subdomain continous monitoring tool.☆172Jan 30, 2024Updated 2 years ago
- bypass-url-parser☆1,128May 9, 2026Updated last week
- De-clutter a list of URLs☆390Mar 8, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- backdoor that uses dns to communicate☆35Aug 9, 2025Updated 9 months ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆758Dec 19, 2023Updated 2 years ago
- ☆385May 17, 2023Updated 3 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,554Mar 8, 2026Updated 2 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,341Aug 7, 2025Updated 9 months ago
- An IIS short filename enumeration tool☆1,160Nov 25, 2024Updated last year
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆415Apr 27, 2026Updated 3 weeks ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆438Dec 30, 2025Updated 4 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 3 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 6 months ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated 2 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Secrets scanner that understands code☆192Nov 2, 2023Updated 2 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago