jesugmz / url-obfuscation
Different methods to obfuscate URLs
☆30Updated 7 years ago
Alternatives and similar repositories for url-obfuscation:
Users that are interested in url-obfuscation are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Pipe different tools with google dork Scanner☆55Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Build interactive map of cameras from Shodan☆22Updated 5 years ago
- Wireless Pentest☆18Updated 6 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆59Updated last month
- ☆51Updated 2 months ago
- Simple Karma Attack☆66Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- Python tool to find specific files in exposed AWS S3 servers.☆20Updated 4 years ago
- A script to automate the creation of a "TOR" router on Debian based systems including Raspberry Pi and install the required tools to do s…☆14Updated 4 years ago
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆65Updated 6 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Updated 4 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 4 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆39Updated 4 months ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆35Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆38Updated 6 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Virtual host wordlist☆51Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆33Updated 4 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago