fyoorer / ShadowCloneLinks
Unleash the power of cloud
☆776Updated 7 months ago
Alternatives and similar repositories for ShadowClone
Users that are interested in ShadowClone are comparing it to the libraries listed below
Sorting:
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆555Updated this week
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆876Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆665Updated 3 months ago
- Golang client for querying SecurityTrails API data☆562Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆657Updated last year
- ☆491Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,124Updated 2 months ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆989Updated last month
- bypass-url-parser☆1,078Updated last week
- The most exhaustive list of reliable DNS resolvers.☆804Updated last week
- ☆470Updated 5 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆627Updated last week
- Small tool to Grab subdomains using Shodan api.☆480Updated 2 weeks ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆519Updated 4 months ago
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology…☆655Updated last month
- An IIS short filename enumeration tool☆969Updated 7 months ago
- Scrape domain names from SSL certificates of arbitrary hosts☆653Updated last year
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆661Updated 2 years ago
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,363Updated last month
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆894Updated 6 months ago
- CT Log Scanner☆382Updated 3 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆981Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,588Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆481Updated 3 years ago
- Discover new target domains using Content Security Policy☆460Updated 3 weeks ago
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆601Updated 4 months ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆447Updated 3 years ago
- De-clutter a list of URLs☆343Updated 7 months ago
- GraphQL automated security testing toolkit☆322Updated last year
- Fast and customizable subdomain wordlist generator using DSL☆825Updated 3 months ago