iustin24 / chameleonLinks
☆380Updated 2 years ago
Alternatives and similar repositories for chameleon
Users that are interested in chameleon are comparing it to the libraries listed below
Sorting:
- IIS shortname scanner written in Go☆340Updated 2 years ago
- Rust-based high performance domain permutation generator.☆291Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆668Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆487Updated 3 years ago
- Automated learning of regexes for DNS discovery☆371Updated 2 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆317Updated last month
- Burp Suite extension that offers a toolkit for testing GraphQL endpoints.☆195Updated last year
- CT Log Scanner☆390Updated 4 months ago
- De-clutter a list of URLs☆346Updated 9 months ago
- Burp extension to create target specific and tailored wordlist from burp history.☆245Updated 3 years ago
- Filter and enrich a list of subdomains by level☆209Updated last year
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆153Updated this week
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆450Updated 3 years ago
- Http request smuggling vulnerability scanner☆226Updated 3 years ago
- A Firefox Web Extension to improve the discovery of DOM XSS.☆276Updated 9 months ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆271Updated last year
- Discover new target domains using Content Security Policy☆479Updated this week
- A fast and minimal JS endpoint extractor☆371Updated 9 months ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆536Updated 5 months ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆383Updated last year
- A Security Tool for Enumerating WebSockets☆360Updated 3 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆232Updated 3 years ago
- ☆174Updated this week
- Distribute ordinary bash commands over many systems☆166Updated 2 years ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆688Updated 4 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆252Updated 10 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆383Updated 2 years ago
- unleashed ffuf☆221Updated 2 months ago
- A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀☆634Updated 2 years ago
- Golang client for querying SecurityTrails API data☆568Updated last year