ivan-sincek / forbidden
Bypass 4xx HTTP response status codes and more. Based on PycURL and Python Requests.
☆233Updated this week
Alternatives and similar repositories for forbidden:
Users that are interested in forbidden are comparing it to the libraries listed below
- Gotator is a tool to generate DNS wordlists through permutations.☆465Updated 2 years ago
- Make URL path combinations using a wordlist☆174Updated last year
- ☆285Updated 2 years ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆240Updated last year
- Burpsuite plugin for Interact.sh☆202Updated 7 months ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆348Updated this week
- Web dashboard for Interactsh client☆198Updated last month
- Full Nuclei automation script with logic explanation.☆242Updated 2 years ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆350Updated last year
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆294Updated 4 months ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆258Updated last year
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆271Updated 6 months ago
- Text4Shell scanner for Burp Suite☆189Updated 2 years ago
- De-clutter a list of URLs☆318Updated 2 months ago
- Hidden parameters discovery suite☆221Updated 2 years ago
- A Burp extension helps identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violations,…☆359Updated 3 months ago
- jsubfinder searches webpages for javascript & analyzes them for hidden subdomains and secrets (wip).☆267Updated 2 weeks ago
- Never forget where you inject.☆227Updated 2 years ago
- Filter and enrich a list of subdomains by level☆198Updated last year
- Automated learning of regexes for DNS discovery☆362Updated last year
- Build your own reconnaissance system with Osmedeus Next Generation☆183Updated 4 months ago
- Domains belonging to the most reputed public bug bounty programs. [NOT FOR NON-MONETARY OR PRIVATE PROGRAMS]☆217Updated 5 months ago
- Jeeves SQLI Finder☆217Updated 2 years ago
- Nuclei templates written by us.☆266Updated 3 years ago
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆514Updated last month
- ☆316Updated 2 weeks ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆180Updated 2 years ago
- ☆148Updated last year
- ☆514Updated last year
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆238Updated 5 months ago