ivan-sincek / forbiddenLinks
Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.
☆251Updated 2 months ago
Alternatives and similar repositories for forbidden
Users that are interested in forbidden are comparing it to the libraries listed below
Sorting:
- Generate tens of thousands of subdomain combinations in a matter of seconds☆274Updated 2 years ago
- Web dashboard for Interactsh client☆235Updated 2 months ago
- Text4Shell scanner for Burp Suite☆190Updated 3 years ago
- CVE Collection of jQuery UI XSS Payloads☆120Updated 2 years ago
- Burpsuite plugin for Interact.sh☆228Updated last year
- Make URL path combinations using a wordlist☆171Updated 2 years ago
- Hidden parameters discovery suite☆226Updated 3 years ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆245Updated 8 months ago
- All Type of Payloads☆137Updated last year
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆297Updated last year
- Build your own reconnaissance system with Osmedeus Next Generation☆200Updated 3 months ago
- Smart context-based SSRF vulnerability scanner.☆361Updated 3 years ago
- Useful "Match and Replace" burpsuite rules☆353Updated 2 years ago
- A Burp Suite extension for identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violati…☆390Updated this week
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty☆215Updated 2 weeks ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆369Updated 2 years ago
- Subdomains analysis and generation tool. Reveal the hidden!☆243Updated 6 months ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆119Updated 2 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆110Updated last year
- jsubfinder searches webpages for javascript & analyzes them for hidden subdomains and secrets (wip).☆276Updated 10 months ago
- this repository is a docker containing some "XSS vulnerability" challenges and bypass examples.☆118Updated 3 years ago
- Domains belonging to the most reputed public bug bounty programs. [NOT FOR NON-MONETARY OR PRIVATE PROGRAMS]☆224Updated last year
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆286Updated 2 years ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆253Updated last year
- A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.☆116Updated last year
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆183Updated 4 years ago
- ☆525Updated 2 years ago
- ☆171Updated last month
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆170Updated 3 years ago
- Full Nuclei automation script with logic explanation.☆245Updated 3 years ago