fyoorer / ShadowClone
Unleash the power of cloud
☆757Updated 3 months ago
Alternatives and similar repositories for ShadowClone:
Users that are interested in ShadowClone are comparing it to the libraries listed below
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆859Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆594Updated 3 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆622Updated 3 months ago
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,262Updated this week
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆624Updated last year
- Scrape domain names from SSL certificates of arbitrary hosts☆631Updated 11 months ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆952Updated last month
- ☆472Updated 10 months ago
- Gotator is a tool to generate DNS wordlists through permutations.☆465Updated 2 years ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆350Updated this week
- Golang client for querying SecurityTrails API data☆545Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,492Updated 9 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆977Updated last year
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆577Updated 11 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆962Updated 8 months ago
- A tool to check a bunch of URLs that contain reflecting params.☆562Updated 6 months ago
- An IIS short filename enumeration tool☆876Updated 3 months ago
- The most exhaustive list of reliable DNS resolvers.☆738Updated this week
- Go client to communicate with Chaos DB API.☆686Updated last week
- Small tool to Grab subdomains using Shodan api.☆394Updated 4 months ago
- Accept URLs on stdin, replace all query string values with a user-supplied value☆796Updated 2 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆490Updated this week
- ☆417Updated last month
- Fast and customizable subdomain wordlist generator using DSL☆776Updated last week
- bash script for Subdomain Enumeration☆350Updated 2 weeks ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆57Updated 10 months ago
- CT Log Scanner☆315Updated last month
- bypass-url-parser☆1,057Updated this week
- Tool to bypass 403/40X response codes.☆1,181Updated 2 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆402Updated last month