g0ldencybersec / gungnir
CT Log Scanner
☆315Updated last month
Alternatives and similar repositories for gungnir:
Users that are interested in gungnir are comparing it to the libraries listed below
- De-clutter a list of URLs☆326Updated 3 months ago
- ☆472Updated 10 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆347Updated this week
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆140Updated last month
- Discover new target domains using Content Security Policy☆396Updated this week
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆624Updated last year
- A streamlined tool for discovering private TLDs for security research.☆178Updated last week
- ☆164Updated 7 months ago
- IIS shortname scanner written in Go☆323Updated last year
- ☆164Updated 4 months ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆490Updated this week
- ☆166Updated 2 weeks ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆594Updated 3 months ago
- Burp extension to create target specific and tailored wordlist from burp history.☆237Updated 3 years ago
- Automated learning of regexes for DNS discovery☆362Updated 2 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆465Updated 2 years ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆164Updated 4 months ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆234Updated last year
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆244Updated this week
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆306Updated 3 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆133Updated 2 months ago
- ☆417Updated last month
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆283Updated 11 months ago
- ☆206Updated 2 weeks ago
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆345Updated 3 months ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆230Updated last year
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆229Updated 3 years ago
- A fast and minimal JS endpoint extractor☆338Updated 3 months ago
- ☆235Updated 3 years ago
- bash script for Subdomain Enumeration☆350Updated 2 weeks ago