jagat-singh-chaudhary / 403-and-401-Bypass-TechniquesLinks
☆47Updated 7 months ago
Alternatives and similar repositories for 403-and-401-Bypass-Techniques
Users that are interested in 403-and-401-Bypass-Techniques are comparing it to the libraries listed below
Sorting:
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 3 months ago
- ☆31Updated 6 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 3 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆24Updated 4 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆115Updated last year
- A tool for inspecting and analyzing mobile application storage files.☆47Updated 5 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆260Updated last week
- AI/LLM local model integration for analysis of reconftw results☆84Updated 5 months ago
- ☆73Updated 4 months ago
- Automated Subdomain Enumeration and Scanning Tool☆116Updated 2 years ago
- A simple browser extension to quickly find interesting security-related information on a webpage.☆99Updated this week
- Grep subdomains from web pages.☆45Updated 8 months ago
- Adobe Experience Manager (AEM) hacking toolkit☆85Updated last month
- ☆49Updated 3 weeks ago
- A passive way to find backups/ sensitive information.☆89Updated 3 months ago
- ☆36Updated 10 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Updated 7 months ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆138Updated 10 months ago
- A Powerful Recon Engine☆68Updated 11 months ago
- Passive Web Vulnerability Detection Tool☆36Updated 5 months ago
- ☆94Updated 6 months ago
- A tool for listing and extracting installed Android APKs and decrypted iOS IPAs (plus app storage) from rooted or jailbroken devices.☆34Updated 5 months ago
- Vulnerabilities you my miss during a penetration testing.☆98Updated last year
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆19Updated last year
- ☆78Updated 4 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆65Updated 4 months ago
- Private Nuclei Templates☆100Updated 8 months ago
- ☆40Updated last year
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Updated last year
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆79Updated 7 months ago