fyoorer / ShadowCloneLinks
Unleash the power of cloud
☆772Updated 6 months ago
Alternatives and similar repositories for ShadowClone
Users that are interested in ShadowClone are comparing it to the libraries listed below
Sorting:
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆869Updated last year
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆505Updated 3 weeks ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆638Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆655Updated last month
- Golang client for querying SecurityTrails API data☆559Updated last year
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,345Updated 2 weeks ago
- ☆489Updated last year
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆979Updated last month
- An IIS short filename enumeration tool☆940Updated 6 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆624Updated 6 months ago
- Small tool to Grab subdomains using Shodan api.☆459Updated 7 months ago
- The most exhaustive list of reliable DNS resolvers.☆789Updated this week
- Accept URLs on stdin, replace all query string values with a user-supplied value☆818Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,101Updated last month
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,566Updated last year
- ☆454Updated 4 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆643Updated 2 years ago
- Fast and customizable subdomain wordlist generator using DSL☆814Updated last month
- Open Redirection Analyzer☆782Updated 2 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆511Updated 2 months ago
- Gotator is a tool to generate DNS wordlists through permutations.☆478Updated 2 years ago
- CT Log Scanner☆362Updated 2 months ago
- Scrape domain names from SSL certificates of arbitrary hosts☆647Updated last year
- Discover new target domains using Content Security Policy☆445Updated 3 weeks ago
- A tool to check a bunch of URLs that contain reflecting params.☆577Updated 10 months ago
- bypass-url-parser☆1,071Updated this week
- oneliner commands for bug bounties☆446Updated 2 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆883Updated 4 months ago
- De-clutter a list of URLs☆341Updated 6 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆312Updated 6 months ago