dsecuredcom / yatafLinks
yataf extracts secrets and paths from files or urls - its best used against javascript files
☆53Updated last year
Alternatives and similar repositories for yataf
Users that are interested in yataf are comparing it to the libraries listed below
Sorting:
- A Go tool that gets the newest PRs from projectdiscovery/nuclei-templates.☆56Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- goverview - Get an overview of the list of URLs☆142Updated 2 years ago
- ☆95Updated 4 years ago
- Bcheck scripts for Burp☆29Updated last year
- vīlicus is a bug bounty api dashboard☆40Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 8 months ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- Let's check if your target is vulnerable for client side prototype pollution.☆66Updated last year
- A set of open-source community scripts☆65Updated last year
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆58Updated last year
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Ffuf output browser☆39Updated 2 years ago
- A simple utility to generate domain names with all possible TLDs☆24Updated 2 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆80Updated 2 years ago
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- ☆57Updated last year
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆38Updated last year
- Enhanced 403 bypass header☆21Updated 3 years ago
- Web cache poisoning vulnerability scanner.☆72Updated 3 years ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆25Updated 2 years ago
- A wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.☆62Updated last year
- Running nuclei Continuously☆57Updated 3 years ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Updated 8 months ago
- Improve automated and semi-automated active scanning in Burp Pro☆62Updated 5 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago