intigriti / misconfig-mapper
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
☆722Updated this week
Alternatives and similar repositories for misconfig-mapper:
Users that are interested in misconfig-mapper are comparing it to the libraries listed below
- Pen Test Report Generation and Assessment Collaboration☆520Updated this week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆449Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆644Updated 3 weeks ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆938Updated last month
- The Internets #1 Subdomain Takeover Tool☆248Updated 3 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆587Updated this week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆336Updated 2 weeks ago
- Header Exploitation HTTP☆504Updated last month
- AI-powered ffuf wrapper☆478Updated 5 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆483Updated last week
- ☆486Updated last year
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆323Updated 3 weeks ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆643Updated this week
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆411Updated last year
- Bitor Scanning Software☆373Updated 3 weeks ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆120Updated 3 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆411Updated 3 months ago
- Discover new target domains using Content Security Policy☆426Updated 2 weeks ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆481Updated 3 weeks ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆636Updated 11 months ago
- Web Security Scanner☆315Updated 11 months ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,220Updated 9 months ago
- ShodanX is a tool to gather information of targets using shodan dorks⚡.☆335Updated 5 months ago
- Fast and customizable subdomain wordlist generator using DSL☆808Updated 3 weeks ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆634Updated last year
- CT Log Scanner☆351Updated last month
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆444Updated 3 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆866Updated last year
- ☆443Updated 3 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆358Updated 2 weeks ago