intigriti / misconfig-mapperLinks
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
☆741Updated this week
Alternatives and similar repositories for misconfig-mapper
Users that are interested in misconfig-mapper are comparing it to the libraries listed below
Sorting:
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- The Internets #1 Subdomain Takeover Tool☆261Updated last month
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆383Updated last week
- Pen Test Report Generation and Assessment Collaboration☆536Updated last week
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆400Updated last week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆424Updated 5 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆534Updated this week
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆770Updated last week
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆944Updated 3 months ago
- ☆492Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆665Updated 3 months ago
- Header Exploitation HTTP☆510Updated this week
- Web Security Scanner☆327Updated last month
- AI-powered ffuf wrapper☆508Updated 7 months ago
- 💀 Don't fear the Reaper 👻☆553Updated 2 weeks ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆124Updated 5 months ago
- Discover new target domains using Content Security Policy☆460Updated 2 weeks ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆627Updated last month
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆421Updated last year
- Attack surface detector that identifies endpoints by static analysis☆714Updated 3 weeks ago
- HTTP 403 bypass tool☆521Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆341Updated last year
- A fast WordPress plugin enumeration tool☆538Updated last week
- The OWASP OFFAT tool autonomously assesses your API for prevalent vulnerabilities, though full compatibility with OAS v3 is pending. The …☆634Updated last week
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆229Updated 11 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆315Updated 7 months ago
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆321Updated this week
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆362Updated 2 months ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆675Updated 2 months ago
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆707Updated 3 months ago