fyoorer / ShadowClone
Unleash the power of cloud
☆733Updated this week
Related projects ⓘ
Alternatives and complementary repositories for ShadowClone
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆845Updated 10 months ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆875Updated 5 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆544Updated last week
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆943Updated 10 months ago
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,204Updated 4 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆533Updated 11 months ago
- Golang client for querying SecurityTrails API data☆539Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,424Updated 6 months ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆835Updated last month
- ☆447Updated 6 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆615Updated this week
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆50Updated 6 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆391Updated last week
- GraphQL automated security testing toolkit☆303Updated 9 months ago
- An IIS short filename enumeration tool☆804Updated 3 months ago
- ☆359Updated 6 months ago
- Small tool to Grab subdomains using Shodan api.☆362Updated 3 weeks ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,255Updated 4 months ago
- The most exhaustive list of reliable DNS resolvers.☆690Updated last week
- Accept URLs on stdin, replace all query string values with a user-supplied value☆768Updated 2 years ago
- My subdomain enumeration script. It's unique in the way it is built upon.☆664Updated 3 months ago
- bypass-url-parser☆1,023Updated last week
- A tool to check a bunch of URLs that contain reflecting params.☆539Updated 3 months ago
- Scrape domain names from SSL certificates of arbitrary hosts☆620Updated 7 months ago
- declutters url lists for crawling/pentesting☆1,205Updated 3 weeks ago
- Gotator is a tool to generate DNS wordlists through permutations.☆457Updated 2 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆402Updated last month
- CT Log Scanner☆290Updated last month
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆381Updated 3 months ago