jkingsman / bishopLinks
Hunt for vulnerable websites as you browse.
☆132Updated 8 years ago
Alternatives and similar repositories for bishop
Users that are interested in bishop are comparing it to the libraries listed below
Sorting:
- Chrome extension that spots web accessible Git repos.☆24Updated 9 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd☆192Updated 9 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆168Updated 2 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆100Updated 8 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Updated 4 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆74Updated 6 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.☆25Updated 9 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆190Updated 6 years ago
- SSRF Protection Library for PHP - http://safecurl.fin1te.net☆73Updated last year
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 7 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆121Updated 9 years ago
- [DEPRECATED] Static analysis tool for javascript code.☆427Updated 3 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆80Updated 9 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆95Updated 6 years ago
- jPurify☆64Updated 8 years ago
- unhash is a set of tools designed to enable better password auditing☆119Updated 2 years ago
- An automated XSS payload generator written in python.☆315Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- Extracting server private key using Heartbleed OpenSSL vulnerability.☆392Updated 10 years ago
- Write JavaScript alert(1) with Katakana characters only☆144Updated 7 years ago
- Top Level Domain data☆66Updated 5 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 7 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Updated 8 years ago
- given an ip address, return which cloud provider it belongs to (AWS, GCE, etc)☆143Updated 7 years ago
- XSS exploitation tool - access victims through HTTP proxy☆159Updated 11 years ago