intigriti / misconfig-mapperLinks
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
☆818Updated last week
Alternatives and similar repositories for misconfig-mapper
Users that are interested in misconfig-mapper are comparing it to the libraries listed below
Sorting:
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆453Updated last year
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆444Updated 2 weeks ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,001Updated 5 months ago
- The Internets #1 Subdomain Takeover Tool☆269Updated 3 months ago
- Pen Test Report Generation and Assessment Collaboration☆560Updated 2 weeks ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆693Updated 4 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆410Updated this week
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆786Updated 2 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆608Updated last week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆429Updated 7 months ago
- Web Security Scanner☆331Updated 3 months ago
- ☆499Updated last year
- Header Exploitation HTTP☆633Updated last month
- 💀 Don't fear the Reaper 👻☆590Updated this week
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆667Updated 3 months ago
- Attack surface detector that identifies endpoints by static analysis☆737Updated this week
- AI-powered ffuf wrapper☆533Updated 9 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆371Updated 4 months ago
- Discover new target domains using Content Security Policy☆482Updated this week
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆942Updated last year
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆349Updated 2 weeks ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆437Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆128Updated 7 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆708Updated last year
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,237Updated last year
- The OWASP OFFAT tool autonomously assesses your API for prevalent vulnerabilities, though full compatibility with OAS v3 is pending. The …☆644Updated last week
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆670Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆232Updated 7 months ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆426Updated 11 months ago
- Small tool to Grab subdomains using Shodan api.☆501Updated last week