Parameter-Reflect-Finder is a python based tool that helps you find reflected parameters which can have potential XSS or Open redirection vulnerabilities.
☆16Aug 8, 2022Updated 3 years ago
Alternatives and similar repositories for Parameter-Reflect-Finder
Users that are interested in Parameter-Reflect-Finder are comparing it to the libraries listed below
Sorting:
- ☆12Jun 16, 2021Updated 4 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆41Apr 10, 2023Updated 2 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- Wheres My Git - Find /.git/config files based on dirs found in home url☆20Feb 14, 2022Updated 4 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- Jbin will gather all the URLs from the website and then it will try to expose the secret data from them such as API keys, API secrets, AP…☆176Jul 8, 2022Updated 3 years ago
- A collection of famous recon public scripts, but in bash <3☆29Mar 2, 2021Updated 5 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Open Redirect scanner - (out of date)☆28Nov 27, 2022Updated 3 years ago
- ExtractSubdomainFromFDNS, updating☆33Sep 5, 2019Updated 6 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- Burpsuite Plugin to detect Directory Traversal vulnerabilities☆27Jul 22, 2021Updated 4 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- ☆11Feb 25, 2026Updated last week
- ☆36Jun 23, 2022Updated 3 years ago
- The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489☆31Mar 26, 2024Updated last year
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Mar 7, 2021Updated 4 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆32Dec 30, 2022Updated 3 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- ☆10Jun 13, 2024Updated last year
- ☆45Jun 5, 2021Updated 4 years ago