dxa4481 / truffleHogRegexes
These are the regexes that power truffleHog
☆218Updated 2 years ago
Alternatives and similar repositories for truffleHogRegexes:
Users that are interested in truffleHogRegexes are comparing it to the libraries listed below
- ☆274Updated 3 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆210Updated 5 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆306Updated 6 years ago
- Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)☆452Updated 5 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆285Updated 3 months ago
- Find AWS S3 buckets and test their permissions.☆381Updated 2 years ago
- Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts a…☆364Updated 2 years ago
- secretz, minimizing the large attack surface of Travis CI☆326Updated 2 years ago
- A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for…☆190Updated 4 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆152Updated 2 years ago
- Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information! It's yo…☆215Updated 5 years ago
- ☆247Updated 9 months ago
- ☆242Updated 6 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆132Updated last year
- Continuous monitoring for JavaScript files☆218Updated 5 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆247Updated last week
- A tool geared towards pentesting APIs using OpenAPI definitions.☆174Updated 2 years ago
- A script that can resolve an input file of domains and scan them with masscan☆157Updated 4 years ago
- A tool for identifying misconfigured CloudFront domains☆351Updated 4 years ago
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions☆221Updated 3 years ago
- Correlated injection proxy tool for XSS Hunter☆254Updated 2 years ago
- AWS S3 Bucket/Object Finder☆119Updated 3 years ago
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆145Updated last year
- a .js scanner, built in php. designed to scrape urls and other info☆213Updated 7 years ago
- GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fing…☆205Updated last year
- Trying to make automated recon for bug bounties☆253Updated 3 years ago
- An hourly updated list of subdomains gathered from certificate transparency logs☆345Updated 3 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- Brute force AWS bucket finder☆60Updated 2 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆339Updated 4 years ago