goku-KaioKen / intigritiLinks
☆13Updated 2 years ago
Alternatives and similar repositories for intigriti
Users that are interested in intigriti are comparing it to the libraries listed below
Sorting:
- Writeup CTF☆22Updated 3 years ago
- All the labs in this repository simulate real world bugs I found in the wild☆197Updated last year
- Prototype Pollution - A detailed study + hands on lab.☆15Updated 3 years ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆165Updated 3 years ago
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆392Updated 5 years ago
- This repository contains a number of insecure self-hosted applications that allows interested security engineers to test vulnerabilities …☆25Updated 8 months ago
- Deriving RSA public keys from message-signature pairs☆362Updated last year
- Burp extension to create target specific and tailored wordlist from burp history.☆254Updated 4 years ago
- Content-Type Research☆650Updated 6 months ago
- ☆146Updated 4 years ago
- Unofficial documentation for the great tool Param Miner☆185Updated 3 years ago
- A fancier postMessage tracker with Chrome Manifest version V3 support and a few additional features, inspired by Frans Rosens postmessage…☆114Updated 3 months ago
- A tool to generate wordlists based on case☆30Updated last month
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆558Updated 10 months ago
- IIS shortname scanner written in Go☆350Updated 2 years ago
- ☆124Updated 2 years ago
- Client Side Prototype Pollution Scanner☆524Updated 3 years ago
- TUDO — A Vulnerable PHP Web App☆125Updated 2 weeks ago
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆192Updated last year
- Bambdas collection for Burp Suite Professional and Community.☆472Updated 3 weeks ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆940Updated 4 years ago
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆302Updated last year
- A comprehensive list of custom filters for Logger++ to identify various vulnerabilities in different API styles☆233Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆325Updated 5 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆640Updated 6 months ago
- ☆300Updated 3 years ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆160Updated 2 months ago
- Automated learning of regexes for DNS discovery☆383Updated 2 years ago
- RepoToStoreBugBountyInfo☆363Updated 5 years ago
- A subdomain fuzzing tool☆172Updated last year