Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
☆900Apr 10, 2026Updated this week
Alternatives and similar repositories for misconfig-mapper
Users that are interested in misconfig-mapper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆839Mar 24, 2026Updated 3 weeks ago
- Discover new target domains using Content Security Policy☆512Mar 24, 2026Updated 3 weeks ago
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆787Dec 9, 2025Updated 4 months ago
- AI-powered ffuf wrapper☆711Dec 4, 2025Updated 4 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,808May 22, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago
- ☆522Apr 29, 2024Updated last year
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,588Mar 8, 2026Updated last month
- An IIS short filename enumeration tool☆1,139Nov 25, 2024Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,336Aug 7, 2025Updated 8 months ago
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,361Apr 4, 2026Updated last week
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆439Mar 6, 2026Updated last month
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆298Oct 5, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CT Log Scanner☆531Dec 26, 2025Updated 3 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆436Apr 3, 2026Updated last week
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆563Mar 8, 2025Updated last year
- Finds graphql queries in javascript files☆69May 18, 2024Updated last year
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,465Jul 14, 2025Updated 9 months ago
- a javascript change monitoring tool for bugbounties☆722Jul 31, 2024Updated last year
- declutters url lists for crawling/pentesting☆1,544Feb 23, 2025Updated last year
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,543Mar 8, 2026Updated last month
- De-clutter a list of URLs☆386Mar 8, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆746Dec 26, 2025Updated 3 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆746Jan 25, 2026Updated 2 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆248Mar 30, 2026Updated 2 weeks ago
- Abuse trust-boundaries to bypass firewalls and network controls☆413Jul 24, 2025Updated 8 months ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆460Oct 3, 2023Updated 2 years ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆429Apr 7, 2026Updated last week
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Dec 9, 2024Updated last year
- A streamlined tool for discovering private TLDs for security research.☆319Apr 6, 2026Updated last week
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Bitor Scanning Software☆459Nov 7, 2025Updated 5 months ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,037Aug 23, 2025Updated 7 months ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,508Jan 8, 2026Updated 3 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,069Mar 24, 2026Updated 3 weeks ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆857Jan 5, 2026Updated 3 months ago
- Convolutional neural network for analyzing pentest screenshots☆1,279Mar 8, 2026Updated last month
- Gather results of dorks across a number of search engines☆311Mar 20, 2026Updated 3 weeks ago