kosmosec / proto-findLinks
Let's check if your target is vulnerable for client side prototype pollution.
☆65Updated last year
Alternatives and similar repositories for proto-find
Users that are interested in proto-find are comparing it to the libraries listed below
Sorting:
- ☆94Updated 3 years ago
- Dump all available paths and/or endpoints on WADL file.☆94Updated 2 weeks ago
- Basic implementation of certstream to print new subdomains and domains☆35Updated 4 years ago
- ☆75Updated last year
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆60Updated 2 years ago
- Detects request smuggling via HTTP/2 downgrades.☆93Updated 3 years ago
- It's an watcher for new scopes added to bounty-targets-data and send you alert to Slack.☆59Updated 3 years ago
- Running nuclei Continuously☆57Updated 2 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated last year
- ☆48Updated 4 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- Tool for making it easy to collect dns results from the CLI☆40Updated last year
- a tool that compiles a csv of all h1 program stats☆47Updated 2 years ago
- The commands and scripts I used in the Live Recon Village talks☆38Updated 4 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated last year
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆91Updated 3 years ago
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆45Updated 2 years ago
- Find subdomains and takeovers.☆85Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- goverview - Get an overview of the list of URLs☆142Updated 2 years ago
- Get all the CNs from a list of domains☆46Updated 4 years ago
- WILSON Cloud Respwnder is a Web Interaction Logger Sending Out Notifications with the ability to serve custom content in order to appropr…☆50Updated 11 months ago
- ☆62Updated 4 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆113Updated 3 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆53Updated 11 months ago
- Some contributions in the nuclei-templates repository☆58Updated 3 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆92Updated last month
- Dependency Confusion Security Testing Tool☆49Updated 3 years ago
- ☆60Updated last year
- ☆44Updated 5 years ago