maK- / parameth
This tool can be used to brute discover GET and POST parameters
☆1,339Updated 5 years ago
Related projects: ⓘ
- ☆2,163Updated 9 months ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,188Updated 9 months ago
- Multi Tool Subdomain Enumeration☆722Updated 3 years ago
- ☆784Updated 10 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,657Updated 4 months ago
- A small tool that extracts relative URLs from a file.☆720Updated 3 years ago
- A Powerful Subdomain Takeover Tool☆919Updated 11 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,299Updated 4 months ago
- A script to enumerate virtual hosts on a server.☆659Updated 6 years ago
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆986Updated 3 years ago
- ⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.☆726Updated last year
- Finds unknown classes of injection vulnerabilities☆626Updated 11 months ago
- A tool to link a domain with registered organisation names and emails, to other domains.☆826Updated 4 months ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,472Updated last year
- Setup script for Regon-ng☆915Updated 3 years ago
- Content discovery wordlists generated using BigQuery☆545Updated 4 years ago
- This repository contains all the supplement material for the book "The art of sub-domain enumeration"☆635Updated 5 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,030Updated 2 months ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆523Updated 2 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆631Updated 5 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,661Updated 2 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,089Updated 4 months ago
- Subdomain Takeover tool written in Go☆1,892Updated last year
- Local file inclusion exploitation tool☆767Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,335Updated last year
- Vulnerability scanner based on vulners.com search API☆828Updated 5 months ago
- CSRF Scanner☆538Updated 2 months ago
- ☆950Updated 9 months ago
- Open Redirect Payloads☆571Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆839Updated 2 years ago