A tool that can take a URL or list of URL and prints back SAML consume URL.
☆35Feb 4, 2019Updated 7 years ago
Alternatives and similar repositories for SAMLExtractor
Users that are interested in SAMLExtractor are comparing it to the libraries listed below
Sorting:
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- A monitoring hub that watches popular open-source repositories and uses AI to detect when commits are patching security vulnerabilities -…☆76Updated this week
- ☆11Jul 28, 2020Updated 5 years ago
- A LLM CTF Challenge☆32Mar 11, 2025Updated 11 months ago
- a prompt injection scanner for custom LLM applications☆21Feb 16, 2025Updated last year
- A CherryTree template for People OSINT. I was inspired by James Hall's CTF template and I used the lessons taught to me by Joe Gray to cr…☆11Aug 16, 2020Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆32Oct 11, 2020Updated 5 years ago
- Unicode Security Guide☆120Oct 16, 2017Updated 8 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Feb 19, 2026Updated last week
- CVE-2021-40444 Sample☆12Sep 10, 2021Updated 4 years ago
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 2 years ago
- This extension provides a central location for viewing all GraphQL requests/responses within a Burp project. It provides a clean UI that …☆15Feb 24, 2022Updated 4 years ago
- ☆250Jun 6, 2018Updated 7 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Oct 8, 2017Updated 8 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- [DEPRECATED] Security posture assessment tool for graph databases.☆21Jan 22, 2025Updated last year
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- Just lists of lists of lists !☆17Oct 13, 2025Updated 4 months ago
- All-in-one AWS S3 bucket tool for pentesters.☆74Feb 16, 2019Updated 7 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- Tool to fuzz for interesting vhost.☆23Jan 8, 2025Updated last year
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- SALSA 💃⚡ - SALesforce Scanner for Aura (and beyond). Enumeration of vulnerabilities and misconfigurations against Salesforce endpoint.☆28Jan 26, 2025Updated last year
- Pseudo-shell for RCE scenarios: tunnels commands via /tmp sockets to a local daemon, keeps context, no bind or reverse shell needed.☆43Jun 12, 2025Updated 8 months ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- Subvenkon is a subdomain enumerator from Venkon☆22Jun 22, 2020Updated 5 years ago
- Extract subdomains from rapiddns.io☆22Nov 24, 2022Updated 3 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 3 years ago
- Tool for test XSS vulnerabilities of a site☆18Apr 1, 2018Updated 7 years ago
- ☆49Feb 6, 2026Updated 3 weeks ago
- A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities☆106Feb 22, 2021Updated 5 years ago
- Continuous monitoring for JavaScript files☆225Dec 29, 2019Updated 6 years ago
- A tool for monitoring bug bounty programs across multiple platforms to track scope changes.☆32Feb 17, 2026Updated last week