jagat-singh-chaudhary / 403-and-401-Bypass-Techniques
☆46Updated last month
Alternatives and similar repositories for 403-and-401-Bypass-Techniques:
Users that are interested in 403-and-401-Bypass-Techniques are comparing it to the libraries listed below
- Bug Bounty Web and API Payloads☆34Updated 5 months ago
- Grep subdomains from web pages.☆42Updated 2 months ago
- A passive way to find backups/ sensitive information.☆77Updated 3 weeks ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆90Updated 8 months ago
- ☆28Updated this week
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆73Updated 3 weeks ago
- ☆34Updated 4 months ago
- Private Nuclei Templates☆98Updated 2 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆31Updated last year
- ☆41Updated 6 months ago
- Passive Web Vulnerability Detection Tool☆31Updated 3 months ago
- Formatify is a Burp Suite extension that instantly converts HTTP requests into multiple formats like cURL, Python, PowerShell, and more—s…☆20Updated last month
- reverse engineered and improved BSQLi script from Coffinxp☆12Updated 7 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆59Updated 6 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆92Updated 3 months ago
- Web Crawler for Identifying Entry Points☆11Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven not…☆27Updated 2 weeks ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆55Updated 2 months ago
- Host Header Vulnerability Scanner Automated Tool☆22Updated last week
- LDAP Enumeration Tool for Pentesters☆31Updated this week
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆20Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆97Updated 2 weeks ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆32Updated 8 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 3 months ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆39Updated 5 months ago
- Tools for bug bounty☆27Updated last year
- A powerful bash script for massive XSS scanning leveraging Brute Logic's KNOXSS API☆71Updated 3 months ago
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆28Updated 8 months ago