drtychai / penum
Parallelized enumeration tool for red team engagements and bug bounty programs.
☆18Updated 3 years ago
Alternatives and similar repositories for penum:
Users that are interested in penum are comparing it to the libraries listed below
- Simple proxy which applies filters (default or custom) to your requests and responses, while you browse a website.☆8Updated 3 years ago
- ☆34Updated 3 weeks ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 4 years ago
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Updated 4 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- A tools for JavaScript Recon☆21Updated 4 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Return domains in CSP headers in http response☆15Updated 3 years ago
- Extract subdomains from rapiddns.io☆23Updated 2 years ago
- Writeup of CVE-2020-15906☆46Updated 4 years ago
- ☆19Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- ☆26Updated 2 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- ☆22Updated 2 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆39Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 5 years ago
- Insecure Deserialization, PDF and lab☆17Updated 5 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Query various sources for CVE proof-of-concepts☆49Updated last year
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- Tool to extract & validate google fcm server keys from apks☆28Updated 4 years ago