g0ldencybersec / sus_paramsLinks
☆197Updated last year
Alternatives and similar repositories for sus_params
Users that are interested in sus_params are comparing it to the libraries listed below
Sorting:
- ☆172Updated 5 months ago
- ☆129Updated 9 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆152Updated this week
- Remote CLI tools at your fingertips☆90Updated last year
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆227Updated 9 months ago
- ☆104Updated last year
- jxscout superpowers JavaScript analysis for security researchers☆223Updated 2 months ago
- ☆137Updated 3 years ago
- ☆43Updated 7 months ago
- unleashed ffuf☆216Updated 2 months ago
- Self-hosted bug bounty programs that are "scammy" or unethical☆141Updated 2 months ago
- ☆179Updated 9 months ago
- De-clutter a list of URLs☆344Updated 8 months ago
- CT Log Scanner☆383Updated 4 months ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆274Updated 2 months ago
- Recon MindMap (RMM)☆159Updated last year
- Automation of tokens/api keys testing.☆133Updated 2 years ago
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.☆83Updated last week
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆139Updated 10 months ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆241Updated last year
- ☆108Updated 2 years ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆143Updated last year
- Chrome extension for automating CSPT discovery☆92Updated last month
- Quick research done on some bug bounty blogs! Check em out :)☆135Updated 6 months ago
- Tool to parse subdomains from dmarc.live☆141Updated last year
- ☆136Updated 4 months ago
- Gather results of dorks across a number of search engines☆131Updated 3 months ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆235Updated last year
- ☆492Updated last year
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆231Updated 3 years ago