ihrishikesh0896 / vulnreachLinks
☆19Updated last month
Alternatives and similar repositories for vulnreach
Users that are interested in vulnreach are comparing it to the libraries listed below
Sorting:
- Search for all leaked keys/secrets using one regex! bugbounty☆140Updated 6 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆260Updated last week
- ☆47Updated 7 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated last month
- ☆94Updated 6 months ago
- ☆189Updated 6 months ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆138Updated 10 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆65Updated 4 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 3 months ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆41Updated 4 months ago
- ☆49Updated 3 weeks ago
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆47Updated last month
- Adobe Experience Manager (AEM) hacking toolkit☆85Updated last month
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆62Updated 6 months ago
- A simple browser extension to quickly find interesting security-related information on a webpage.☆99Updated this week
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆79Updated 7 months ago
- ☆127Updated 4 months ago
- ☆31Updated 6 months ago
- This is an AD pentest tools collection☆59Updated last year
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆24Updated 4 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆102Updated 2 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 3 months ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆19Updated last year
- A tool for inspecting and analyzing mobile application storage files.☆47Updated 5 months ago
- AI/LLM local model integration for analysis of reconftw results☆84Updated 5 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆108Updated 4 months ago
- This repository serves as a curated resource for OffSec's OSEP (PEN-300) certification preparation, containing useful links, materials, a…☆64Updated 11 months ago
- Analyze Android native `.so` files☆85Updated 2 months ago
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆178Updated 2 months ago
- ☆73Updated 4 months ago