hakluke / hakoriginfinder
Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!
☆852Updated last year
Alternatives and similar repositories for hakoriginfinder:
Users that are interested in hakoriginfinder are comparing it to the libraries listed below
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆931Updated 7 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆617Updated last year
- Fast and customizable subdomain wordlist generator using DSL☆753Updated this week
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,231Updated last month
- An IIS short filename enumeration tool☆852Updated last month
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆56Updated 8 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆571Updated 2 months ago
- The most exhaustive list of reliable DNS resolvers.☆713Updated this week
- Golang client for querying SecurityTrails API data☆544Updated last year
- Small tool to Grab subdomains using Shodan api.☆381Updated 2 months ago
- bypass-url-parser☆1,049Updated this week
- Go client to communicate with Chaos DB API.☆667Updated this week
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆436Updated 2 years ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆578Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆465Updated 2 years ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆572Updated 9 months ago
- Accept URLs on stdin, replace all query string values with a user-supplied value☆781Updated 2 years ago
- Discover new target domains using Content Security Policy☆390Updated this week
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆957Updated 6 months ago
- ☆384Updated last week
- Tool to bypass 403/40X response codes.☆1,166Updated 2 weeks ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆969Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆618Updated 2 months ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,289Updated 6 months ago
- Scrape domain names from SSL certificates of arbitrary hosts☆629Updated 9 months ago
- ☆519Updated 6 months ago
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆491Updated 3 months ago
- A tool to check a bunch of URLs that contain reflecting params.☆556Updated 5 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,460Updated 7 months ago
- A fuzzer for detecting open redirect vulnerabilities☆723Updated 6 months ago