g0ldencybersec / sus_paramsLinks
☆203Updated last year
Alternatives and similar repositories for sus_params
Users that are interested in sus_params are comparing it to the libraries listed below
Sorting:
- ☆155Updated last year
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆160Updated last month
- ☆175Updated 3 months ago
- Remote CLI tools at your fingertips☆99Updated last year
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆286Updated last year
- ☆45Updated 11 months ago
- Self-hosted bug bounty programs that are "scammy" or unethical☆148Updated last month
- Automation of tokens/api keys testing.☆146Updated 2 years ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆275Updated last week
- ☆106Updated last year
- jxscout superpowers JavaScript analysis for security researchers☆304Updated 2 months ago
- De-clutter a list of URLs☆373Updated 2 months ago
- unleashed ffuf☆230Updated last month
- Chrome extension for automating CSPT discovery☆123Updated 5 months ago
- CT Log Scanner☆422Updated 8 months ago
- GQLSpection - parses GraphQL introspection schema and generates possible queries☆97Updated 9 months ago
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.☆95Updated 3 months ago
- ☆183Updated last year
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆145Updated last year
- Recon MindMap (RMM)☆164Updated last year
- Your AI javascript collaborator☆40Updated 6 months ago
- Quick research done on some bug bounty blogs! Check em out :)☆144Updated 10 months ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆140Updated last year
- ☆74Updated last year
- ☆109Updated 2 years ago
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆222Updated 4 months ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆236Updated last year
- ☆146Updated 4 years ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆151Updated 11 months ago
- ☆157Updated 8 months ago