Prompt Injection Primer for Engineers
☆577Aug 25, 2023Updated 2 years ago
Alternatives and similar repositories for PIPE
Users that are interested in PIPE are comparing it to the libraries listed below
Sorting:
- a security scanner for custom LLM applications☆1,149Dec 1, 2025Updated 3 months ago
- An IIS short filename enumeration tool☆1,131Nov 25, 2024Updated last year
- vīlicus is a bug bounty api dashboard☆41Aug 13, 2023Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,782May 22, 2024Updated last year
- Burp Suite extension that offers a toolkit for testing GraphQL endpoints.☆203Aug 5, 2024Updated last year
- AI-powered ffuf wrapper☆651Dec 4, 2025Updated 3 months ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- ☆153Aug 18, 2023Updated 2 years ago
- ☆520Apr 29, 2024Updated last year
- Finds graphql queries in javascript files☆69May 18, 2024Updated last year
- ☆181Oct 15, 2024Updated last year
- Differential testing framework for HTTP implementations☆929Jan 21, 2026Updated 2 months ago
- Discover new target domains using Content Security Policy☆508Feb 7, 2026Updated last month
- ☆107Jul 17, 2024Updated last year
- A research project to add some brrrrrr to Burp☆208Feb 16, 2026Updated last month
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Jul 7, 2022Updated 3 years ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆456Oct 3, 2023Updated 2 years ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆44Sep 22, 2024Updated last year
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,330Mar 5, 2026Updated 2 weeks ago
- ☆212Jul 11, 2024Updated last year
- CT Log Scanner☆526Dec 26, 2025Updated 2 months ago
- LLM Prompt Injection Detector☆1,445Aug 7, 2024Updated last year
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,134Mar 15, 2026Updated last week
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆238Jan 10, 2024Updated 2 years ago
- ☆755Jun 26, 2024Updated last year
- Find related domains of a given domain.☆104Aug 5, 2023Updated 2 years ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆229Feb 6, 2025Updated last year
- De-clutter a list of URLs☆385Mar 8, 2026Updated last week
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,503Jan 8, 2026Updated 2 months ago
- Dropbox LLM Security research code and results☆256May 21, 2024Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,297Aug 7, 2025Updated 7 months ago
- Unleash the power of cloud☆816Nov 19, 2024Updated last year
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆298Oct 5, 2024Updated last year
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆62Jun 12, 2023Updated 2 years ago
- ☆17Jan 9, 2025Updated last year
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆140Dec 7, 2024Updated last year
- Identify virtual hosts by similarity comparison☆137Updated this week
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,532Mar 8, 2026Updated last week
- 🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️☆227May 22, 2023Updated 2 years ago