Discover hidden debugging parameters and uncover web application secrets
☆248Feb 4, 2026Updated 2 months ago
Alternatives and similar repositories for debugHunter
Users that are interested in debugHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆377Jul 25, 2023Updated 2 years ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆888May 3, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆143Jun 27, 2023Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆91Sep 12, 2023Updated 2 years ago
- 「🔑」A tool used to hunt down API key leaks in JS files and pages☆885Mar 12, 2026Updated last month
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆167Oct 28, 2025Updated 6 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆91May 2, 2024Updated last year
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆587Sep 25, 2025Updated 7 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,821May 22, 2024Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,074Mar 24, 2026Updated last month
- jsubfinder searches webpages for javascript & analyzes them for hidden subdomains and secrets (wip).☆280Jan 15, 2025Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆88Dec 29, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Apr 18, 2024Updated 2 years ago
- Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.☆309Jul 15, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- A Go tool that gets the newest PRs from projectdiscovery/nuclei-templates.☆55Jun 13, 2023Updated 2 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,511Jan 8, 2026Updated 3 months ago
- Resolvers updated daily for reconftw☆49Feb 7, 2023Updated 3 years ago
- Self-hosted passive subdomain continous monitoring tool.☆172Jan 30, 2024Updated 2 years ago
- bypass-url-parser☆1,124Apr 18, 2026Updated last week
- De-clutter a list of URLs☆387Mar 8, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- backdoor that uses dns to communicate☆35Aug 9, 2025Updated 8 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆755Dec 19, 2023Updated 2 years ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆298Sep 8, 2023Updated 2 years ago
- ☆383May 17, 2023Updated 2 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,543Mar 8, 2026Updated last month
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,339Aug 7, 2025Updated 8 months ago
- An IIS short filename enumeration tool☆1,146Nov 25, 2024Updated last year
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆414Updated this week
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆437Dec 30, 2025Updated 4 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 5 months ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Secrets scanner that understands code☆191Nov 2, 2023Updated 2 years ago
- 1337 Wordlists for Bug Bounty Hunting☆954Updated this week