mhaskar / BughoundLinks
Static code analysis tool based on Elasticsearch
☆129Updated 4 years ago
Alternatives and similar repositories for Bughound
Users that are interested in Bughound are comparing it to the libraries listed below
Sorting:
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- ☆67Updated 6 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 3 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆134Updated 3 years ago
- Workshop given at Hack in Paris 2019☆122Updated 2 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- ☆71Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 4 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago
- ☆90Updated 3 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- ☆48Updated 4 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- ☆48Updated 4 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- REST API backend for Reconmap☆47Updated last week
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆199Updated last month
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- ☆76Updated 4 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆111Updated 3 years ago
- ☆148Updated 3 years ago
- ☆49Updated 7 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 5 months ago