fyoorer / ShadowCloneLinks
Unleash the power of cloud
☆775Updated 7 months ago
Alternatives and similar repositories for ShadowClone
Users that are interested in ShadowClone are comparing it to the libraries listed below
Sorting:
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆523Updated 2 weeks ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆642Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆871Updated last year
- ☆490Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆661Updated 2 months ago
- Golang client for querying SecurityTrails API data☆561Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,574Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,119Updated 2 months ago
- De-clutter a list of URLs☆342Updated 7 months ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆982Updated 2 weeks ago
- An IIS short filename enumeration tool☆960Updated 7 months ago
- Small tool to Grab subdomains using Shodan api.☆466Updated 8 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆421Updated 5 months ago
- CT Log Scanner☆376Updated 2 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆654Updated 2 years ago
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology…☆647Updated 2 weeks ago
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,356Updated last month
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆516Updated 3 months ago
- Discover new target domains using Content Security Policy☆448Updated this week
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆626Updated 7 months ago
- bash script for Subdomain Enumeration☆374Updated last month
- oneliner commands for bug bounties☆446Updated 2 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆884Updated 5 months ago
- The most exhaustive list of reliable DNS resolvers.☆797Updated this week
- i will upload more templates here to share with the comunity.☆549Updated last year
- Accept URLs on stdin, replace all query string values with a user-supplied value☆823Updated 2 years ago
- Fast and customizable subdomain wordlist generator using DSL☆821Updated 2 months ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆365Updated last year
- Automated learning of regexes for DNS discovery☆370Updated 2 years ago
- This a adaption of tomnomnom's kxss tool with a different output format☆476Updated last year