honoki / bbrf-serverLinks
The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices
☆329Updated 6 months ago
Alternatives and similar repositories for bbrf-server
Users that are interested in bbrf-server are comparing it to the libraries listed below
Sorting:
- Burp extension to create target specific and tailored wordlist from burp history.☆255Updated 4 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆642Updated 7 months ago
- ☆299Updated 3 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆502Updated 3 years ago
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆393Updated 5 years ago
- Nuclei templates written by geeknik. Claude is my co-pilot. 🤖☆290Updated 6 months ago
- Js File Scanner☆169Updated 4 years ago
- Burp Extension for easily creating Wordlists☆215Updated 4 years ago
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆238Updated 3 years ago
- Prototype pollution scanner using headless chrome☆219Updated 3 years ago
- IIS shortname scanner written in Go☆355Updated 2 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆560Updated 11 months ago
- A fast and minimal JS endpoint extractor☆387Updated last year
- Secret and/or credential patterns used for gf.☆243Updated 2 years ago
- Customisable and automated HTTP header injection☆271Updated last year
- Automated learning of regexes for DNS discovery☆389Updated 2 years ago
- Golang client for querying SecurityTrails API data☆581Updated 2 weeks ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆519Updated 3 years ago
- Unofficial documentation for the great tool Param Miner☆184Updated 3 years ago
- A DNS Bruteforcing Wordlist Generator☆362Updated 2 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆235Updated 4 years ago
- ☆435Updated 4 years ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆283Updated last year
- Finding XSS during recon☆271Updated 3 years ago
- This is go CLI tool for send fast Multiple get HTTP request.☆283Updated 3 years ago
- Turbo Intruder Scripts☆228Updated 5 years ago
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆349Updated 4 years ago
- De-clutter a list of URLs☆383Updated this week
- ☆157Updated 2 years ago
- Burpsuite plugin for Interact.sh☆230Updated last year