fyoorer / ShadowCloneLinks
Unleash the power of cloud
☆817Updated last year
Alternatives and similar repositories for ShadowClone
Users that are interested in ShadowClone are comparing it to the libraries listed below
Sorting:
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆711Updated last month
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆734Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆973Updated last year
- Golang client for querying SecurityTrails API data☆578Updated 2 years ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,034Updated 4 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆696Updated 2 weeks ago
- ☆516Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,271Updated 5 months ago
- CT Log Scanner☆492Updated 2 weeks ago
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology…☆791Updated 7 months ago
- ☆533Updated last month
- Small tool to Grab subdomains using Shodan api.☆523Updated 4 months ago
- An IIS short filename enumeration tool☆1,056Updated last year
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆558Updated 10 months ago
- The most exhaustive list of reliable DNS resolvers.☆921Updated this week
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆640Updated 6 months ago
- bypass-url-parser☆1,108Updated 2 weeks ago
- Discover new target domains using Content Security Policy☆498Updated last week
- Gotator is a tool to generate DNS wordlists through permutations.☆505Updated 3 years ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆746Updated 2 years ago
- Security Auditor Utility for GraphQL APIs☆585Updated last month
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,460Updated this week
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆957Updated last year
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,007Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,710Updated last year
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆743Updated last month
- Scrape domain names from SSL certificates of arbitrary hosts☆689Updated last year
- ☆419Updated 4 years ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆453Updated 3 years ago
- Automated learning of regexes for DNS discovery☆385Updated 2 years ago