Host Header Vulnerability Scanner Automated Tool
☆28Apr 18, 2025Updated 11 months ago
Alternatives and similar repositories for Host-Header-Injection-Vulnerability-Scanner
Users that are interested in Host-Header-Injection-Vulnerability-Scanner are comparing it to the libraries listed below
Sorting:
- ☆15Mar 21, 2025Updated last year
- ☆11Mar 27, 2024Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Nov 4, 2022Updated 3 years ago
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆37May 1, 2023Updated 2 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.☆19Jul 3, 2024Updated last year
- reverse engineered and improved BSQLi script from Coffinxp☆15Aug 30, 2024Updated last year
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated 11 months ago
- Cool HackerOne Reports☆22Nov 16, 2022Updated 3 years ago
- This is a Kind of Dictionary which contains all kinds of Web Application and Network Security Vulnerabilities and other security concepts…☆85Mar 18, 2025Updated last year
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- ☆12Jan 30, 2025Updated last year
- ☆20Jul 23, 2025Updated 7 months ago
- ☆10Apr 6, 2024Updated last year
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆17Oct 30, 2025Updated 4 months ago
- ☆20Dec 23, 2023Updated 2 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks☆37Feb 20, 2024Updated 2 years ago
- Multithreading loop fuzzing with `ffuf` into your subdomains list with unique results☆31May 12, 2024Updated last year
- Here we are gather all Nuclei Templates that are Publically available.☆15Apr 28, 2024Updated last year
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- Chameleon Wordlists☆15Sep 13, 2022Updated 3 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 3 years ago
- BPP hunting☆10Nov 10, 2024Updated last year
- Passively check for XSS character encodings☆18Mar 9, 2026Updated last week
- ☆19Apr 29, 2019Updated 6 years ago
- A tool written in python for scraping firebase data☆43Apr 5, 2020Updated 5 years ago
- A utility for detecting webpage inputs and conducting XSS scans.☆160May 5, 2024Updated last year
- ☆19Jan 24, 2023Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- My-custom-sensitive-info-disclsure-nuclei-template☆30Jan 3, 2026Updated 2 months ago
- web cache poison - Top 1 web hacking technique of 2019☆25Feb 24, 2020Updated 6 years ago
- vidy007's dotfiles☆11Jan 21, 2025Updated last year
- Custom wordlist, updated regularly☆128Feb 17, 2026Updated last month
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated last month
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 3 years ago
- ☆25Aug 14, 2020Updated 5 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago