ivan-sincek / forbiddenLinks
Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.
☆245Updated 3 months ago
Alternatives and similar repositories for forbidden
Users that are interested in forbidden are comparing it to the libraries listed below
Sorting:
- Make URL path combinations using a wordlist☆174Updated last year
- Build your own reconnaissance system with Osmedeus Next Generation☆196Updated last week
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆382Updated 2 years ago
- Smart context-based SSRF vulnerability scanner.☆351Updated 3 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆481Updated 2 years ago
- A Burp extension helps identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violations,…☆371Updated 2 months ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆248Updated 10 months ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆296Updated 9 months ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆320Updated 5 months ago
- Burpsuite plugin for Interact.sh☆223Updated last year
- Web dashboard for Interactsh client☆224Updated 3 weeks ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆362Updated last year
- Domains belonging to the most reputed public bug bounty programs. [NOT FOR NON-MONETARY OR PRIVATE PROGRAMS]☆216Updated 9 months ago
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆518Updated 6 months ago
- All Type of Payloads☆136Updated last year
- ☆520Updated 2 years ago
- ☆294Updated 2 years ago
- Jeeves SQLI Finder☆218Updated 3 years ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆243Updated 3 months ago
- Text4Shell scanner for Burp Suite☆191Updated 2 years ago
- ☆242Updated 4 years ago
- Useful "Match and Replace" burpsuite rules☆348Updated last year
- Generate tens of thousands of subdomain combinations in a matter of seconds☆271Updated last year
- Nuclei templates written by us.☆272Updated 3 years ago
- Never forget where you inject.☆254Updated 2 years ago
- Http request smuggling vulnerability scanner☆227Updated 2 years ago
- jsubfinder searches webpages for javascript & analyzes them for hidden subdomains and secrets (wip).☆273Updated 5 months ago
- Local File Inclusion discovery and exploitation tool☆313Updated 5 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆71Updated last year
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆387Updated this week