ksharinarayanan / WAPView external linksLinks
Open source alternative to Burpsuite
☆15May 18, 2021Updated 4 years ago
Alternatives and similar repositories for WAP
Users that are interested in WAP are comparing it to the libraries listed below
Sorting:
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 6 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- Handy bash and python scripts for bug bounty hunting!☆47May 4, 2021Updated 4 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 9 months ago
- Fast subdomains enumeration tool for penetration testers☆14Feb 3, 2020Updated 6 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆19Aug 19, 2025Updated 5 months ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- This repository contains complete source code for setting up the environment and exploit code for the vulnerability.☆19Mar 23, 2023Updated 2 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- The application is a PoC that helps in identifying modern bankers, potentially malicious and remote controlling applications abusing Andr…☆43Jan 14, 2025Updated last year
- This repo hosts multiple codes, content, checklists etc which can help a penetration tester in a web application auditing.☆21Sep 14, 2023Updated 2 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- Mini recon script to identify the links and sensitive information from a particular link☆22Mar 9, 2021Updated 4 years ago
- Web application recon for bug bounty☆21Apr 19, 2020Updated 5 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- ☆54Jan 22, 2025Updated last year
- ☆28Jun 2, 2021Updated 4 years ago
- ☆27Mar 5, 2023Updated 2 years ago
- git clone all repositories and gists from a given GitHub username☆32Nov 15, 2025Updated 3 months ago
- Automated Web Recon Shell Scripts☆53Dec 6, 2021Updated 4 years ago
- Guide For WAF Bypass Techniques☆28Aug 15, 2020Updated 5 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Jan 31, 2022Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆117Feb 16, 2025Updated 11 months ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- ☆33Jan 22, 2025Updated last year
- A listing of the most common vuln that you can link in your PoCs☆28Oct 27, 2018Updated 7 years ago
- This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.☆30Dec 1, 2020Updated 5 years ago
- ☆41Aug 8, 2023Updated 2 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Feb 21, 2023Updated 2 years ago