intigriti / misconfig-mapper
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
☆706Updated last week
Alternatives and similar repositories for misconfig-mapper:
Users that are interested in misconfig-mapper are comparing it to the libraries listed below
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆449Updated last year
- Pen Test Report Generation and Assessment Collaboration☆512Updated 3 weeks ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆622Updated last month
- The Internets #1 Subdomain Takeover Tool☆245Updated 3 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆405Updated 2 months ago
- AI-powered ffuf wrapper☆464Updated 4 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆629Updated 10 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆329Updated last week
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆449Updated this week
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆568Updated 3 weeks ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆936Updated 3 weeks ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆476Updated this week
- ☆479Updated 11 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆348Updated 4 months ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆626Updated this week
- HTTP 403 bypass tool☆506Updated last year
- Discover new target domains using Content Security Policy☆416Updated this week
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆334Updated last year
- Header Exploitation HTTP☆495Updated 2 weeks ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆637Updated last year
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆409Updated last year
- Zero-dollar attack surface management tool☆280Updated last year
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆223Updated 2 weeks ago
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆237Updated 2 months ago
- Web Security Scanner☆315Updated 11 months ago
- ☆664Updated last month
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆83Updated 2 months ago
- Fast and customizable subdomain wordlist generator using DSL☆791Updated last month
- ☆311Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆214Updated 8 months ago