jhaddix / ios_shLinks
ios source grepper
☆39Updated 8 years ago
Alternatives and similar repositories for ios_sh
Users that are interested in ios_sh are comparing it to the libraries listed below
Sorting:
- Usefull stuff from around teh internetz☆110Updated 7 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆122Updated 7 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆168Updated 9 years ago
- Web Application Security☆127Updated last year
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- PwnWiki - The notes section of the pentesters mind.☆25Updated 11 years ago
- ☆181Updated 11 years ago
- ☆20Updated 9 years ago
- Project "Flashbang" - An open-source Flash-security helper☆205Updated 10 years ago
- BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.☆151Updated 3 months ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 7 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Updated last year
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆258Updated 3 years ago
- "What To" guide for finding vulnerabilities in sites.☆21Updated 8 years ago
- Tools of "The Bug Hunters Methodology V2 by @jhaddix"☆199Updated 7 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- ❄️ Research project for SubFinder core API V2☆36Updated 6 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 6 months ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆135Updated 8 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆306Updated 6 years ago
- ☆26Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Updated 4 years ago
- Exploit insecure crossdomain.xml files.☆26Updated 8 years ago