imhego / pointerLinks
Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.
☆14Updated 2 years ago
Alternatives and similar repositories for pointer
Users that are interested in pointer are comparing it to the libraries listed below
Sorting:
- ☆23Updated last year
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Updated 3 months ago
- A simple plugin to export JS files from one or multiple targets☆43Updated 2 years ago
- AutoAR is a comprehensive, modular security automation toolkit designed for bug bounty hunters, penetration testers, and security researc…☆53Updated this week
- Fback is a tool that helps you create target-specific wordlists using a .json pattern.☆63Updated 2 months ago
- ☆37Updated last year
- Bypass Reset Password Code Lead to Account Takeover☆26Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Updated 2 years ago
- ☆27Updated 2 years ago
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆54Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆81Updated 2 months ago
- bash script for automating subdomain enumeration process either passive or active☆29Updated last year
- Custom nuclei templates for bug hunting.....☆26Updated last year
- ☆70Updated 2 years ago
- Nuclei Templates☆25Updated last year
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆55Updated 2 months ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆18Updated 2 years ago
- Dig through the Wayback Machine and find sensitive or forgotten files exposed by web servers over time.☆26Updated 10 months ago
- RobinHood - Bug Hunting Recon Automation Script☆37Updated 3 years ago
- Process URLs and remove duplicate query parameters.☆28Updated last year
- Tools and methods that I personally use for Recon and Exploitations☆46Updated 9 months ago
- Collection of templates from various resources☆42Updated 2 months ago
- ☆47Updated last year
- Tools for bug bounty☆29Updated 6 months ago
- A tool for extract Endpoints, URLs and Secrets from contents☆68Updated this week
- convert case style of words☆57Updated 2 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Updated 3 years ago
- Passive Web Vulnerability Detection Tool☆37Updated 9 months ago
- A Collection of Wordlists for Penetration Testing☆32Updated last month
- Firebase_Checker is Python tool to analyze APK files and web applications for Firebase-related vulnerabilities. This tool identifies secu…☆53Updated 3 months ago