mandatoryprogrammer / xpire-crossdomain-scannerLinks
Scans crossdomain.xml policies for expired domain names.
☆25Updated 9 years ago
Alternatives and similar repositories for xpire-crossdomain-scanner
Users that are interested in xpire-crossdomain-scanner are comparing it to the libraries listed below
Sorting:
- A tool for enumerating expired domains in CNAME records☆59Updated 8 years ago
- WHY?☆18Updated 8 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 9 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- A tool for fetching archived URLs (to be rewritten in Go).☆40Updated 6 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 6 years ago
- Dynamic DNS Update Bruteforce Tool☆29Updated 8 years ago
- ☆13Updated 2 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- PDF report generator for basic recon☆9Updated 7 years ago
- PHP tool to test XSS☆22Updated 5 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated 2 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- An Extended, Modulair, Host Discovery Framework☆43Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- ❄️ Research project for SubFinder core API V2☆36Updated 6 years ago
- WebApp for BugBounty Hunters☆14Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- Simple, hand-picked list of fuzz strings☆32Updated 8 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago