int0x33 / 420
Automated XSS Vulnerability Finder
☆30Updated 4 years ago
Alternatives and similar repositories for 420:
Users that are interested in 420 are comparing it to the libraries listed below
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆42Updated 2 years ago
- ☆45Updated 7 years ago
- Domain availbility checker☆39Updated 3 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆58Updated 3 years ago
- ☆59Updated 6 months ago
- A python library to automate time-based blind SQL injection☆51Updated 5 years ago
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆57Updated 4 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆39Updated 4 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆39Updated last year
- Messy BurpSuite plugin for SQL Truncation vulnerabilities.☆62Updated 4 years ago
- ☆47Updated 3 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆42Updated last year
- A simple tool which makes creating nuclei templates even easier.☆36Updated 6 months ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆26Updated 2 years ago
- Host Header Injection Scanner☆44Updated 4 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆54Updated 2 years ago
- Offsec Pentest and Bug Bounty Notes☆24Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆37Updated 3 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆92Updated 2 years ago
- REST API backend for Reconmap☆47Updated last week
- Bug Bounty Tools☆34Updated 4 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆20Updated 4 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago