jagat-singh-chaudhary / 403-and-401-Bypass-Techniques
☆43Updated 3 weeks ago
Alternatives and similar repositories for 403-and-401-Bypass-Techniques:
Users that are interested in 403-and-401-Bypass-Techniques are comparing it to the libraries listed below
- Grep subdomains from web pages.☆42Updated last month
- A passive way to find backups/ sensitive information.☆72Updated 2 months ago
- Bug Bounty Web and API Payloads☆34Updated 4 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆85Updated 7 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆39Updated last week
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆92Updated 2 months ago
- ☆34Updated 3 months ago
- Passive Web Vulnerability Detection Tool☆31Updated 2 months ago
- Web Crawler for Identifying Entry Points☆11Updated last year
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆58Updated 5 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆89Updated last week
- Private Nuclei Templates☆97Updated last month
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 2 months ago
- Vulnerabilities you my miss during a penetration testing.☆98Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆30Updated last year
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆38Updated 2 weeks ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆33Updated last month
- Formatify is a Burp Suite extension that instantly converts HTTP requests into multiple formats like cURL, Python, PowerShell, and more—s…☆21Updated 2 weeks ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆53Updated last month
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆53Updated 2 weeks ago
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆18Updated last year
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆30Updated 7 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆54Updated last month
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆39Updated last year
- A Powerful Recon Engine☆61Updated 4 months ago
- A collection of config files for linux focusing on hackthebox theme☆41Updated 3 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆109Updated 5 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆24Updated this week
- Host Header Vulnerability Scanner Automated Tool☆22Updated last year