l4yton / RegHexLinks
A collection of regexes for every possbile use
☆431Updated last year
Alternatives and similar repositories for RegHex
Users that are interested in RegHex are comparing it to the libraries listed below
Sorting:
- list of regex patterns for oauth / api tokens with provided source☆272Updated 7 months ago
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆337Updated 4 years ago
- Takes a list of URLs and returns their HTTP response codes☆396Updated last year
- a javascript change monitoring tool for bugbounties☆656Updated last year
- Golang client for querying SecurityTrails API data☆564Updated last year
- Fetches javascript file from a list of URLS or subdomains.☆788Updated 2 weeks ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆630Updated last month
- ☆374Updated 3 years ago
- Client Side Prototype Pollution Scanner☆519Updated 2 years ago
- A tool to fastly get all javascript sources/files☆815Updated last month
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆231Updated 3 years ago
- A DNS Bruteforcing Wordlist Generator☆361Updated 2 years ago
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆263Updated 11 months ago
- The Fairly Fast Fetcher. Requests a bunch of URLs provided on stdin fairly quickly.☆405Updated last year
- A tool to check a bunch of URLs that contain reflecting params.☆587Updated last year
- GraphQL automated security testing toolkit☆323Updated last year
- The most exhaustive list of reliable DNS resolvers.☆815Updated this week
- BugBountyTips☆415Updated last week
- Rust-based high performance domain permutation generator.☆290Updated last year
- A fast and minimal JS endpoint extractor☆369Updated 9 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆317Updated last month
- ☆393Updated 3 years ago
- Secret and/or credential patterns used for gf.☆242Updated 2 years ago
- Accept URLs on stdin, replace all query string values with a user-supplied value☆835Updated 2 years ago
- Unofficial documentation for the great tool Param Miner☆181Updated 2 years ago
- Go client to communicate with Chaos DB API.☆747Updated 2 weeks ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆318Updated last year
- Scrape domain names from SSL certificates of arbitrary hosts☆657Updated last year
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆739Updated 11 months ago
- Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists☆742Updated 2 years ago