leaky-forms / leaky-forms-crawler
Puppeteer based crawler to measure email and password exfiltration
☆21Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for leaky-forms-crawler
- Damn Vulnerable ElectronJS App (DVEA)☆11Updated 2 months ago
- A collection of my Semgrep rules☆47Updated last year
- Squatm3gator is a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the…☆30Updated 3 years ago
- Target practice for ffuf☆58Updated 3 years ago
- Extract domains/subdomains/FQDNs from files and URLs☆19Updated 4 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆29Updated 2 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆63Updated 10 months ago
- Chrome extension that lists Amazon S3 Buckets while browsing☆78Updated 2 weeks ago
- The Paper Artifact Availability☆19Updated 2 years ago
- The Template Injection Playground allows to test a large number of the most relevant template engines for template injection possibilitie…☆15Updated 5 months ago
- Simple PoC generator for clickjacking vulnerabilities☆20Updated 10 months ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆13Updated last week
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- Recon-Ninja☆88Updated 7 months ago
- Multithreaded Host Header Redirection Scanner☆12Updated 4 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Updated last year
- Find XS-Leaks in the browser by diffing DOM-Graphs in two states☆14Updated 11 months ago
- Useful configurations for the DomLogger++ extension☆30Updated 2 months ago
- Obtain GraphQL API Schema even if the introspection is not enabled☆11Updated last year
- Advanced test for proxy & waf☆12Updated last month
- Analyze Content-Security-Policy header of a given URL.☆26Updated 9 months ago
- ☆26Updated last week
- List of bug bounty and coordinated vulnerability disclosure programs of companies/organisations in Switzerland☆64Updated 8 months ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 2 years ago
- The commands and scripts I used in the Live Recon Village talks☆38Updated 3 years ago
- Generate a cross join, also known as a Cartesian product, from the lines of the specified files. This process is useful for creating fuzz…☆16Updated last year
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆40Updated last year
- Python script implementing the favicon hash trick to find subdomains.☆26Updated last year
- Xss payload for bypassing waf☆14Updated 4 years ago
- ☆69Updated 3 years ago