midoxnet / mapperplusLinks
MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.
β257Updated 10 months ago
Alternatives and similar repositories for mapperplus
Users that are interested in mapperplus are comparing it to the libraries listed below
Sorting:
- This is a python wrapper around the amazing KNOXSS API by Brute Logicβ273Updated 3 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better πβ153Updated last week
- β174Updated last week
- De-clutter a list of URLsβ346Updated 9 months ago
- unleashed ffufβ221Updated 3 months ago
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hiddeβ¦β385Updated 5 months ago
- β198Updated last year
- β138Updated 3 years ago
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.β86Updated 2 weeks ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLsβ144Updated last year
- List of Directory Traversal/LFI Payloads Scraped from the Internetβ178Updated 6 months ago
- β43Updated 7 months ago
- β132Updated 10 months ago
- β183Updated 10 months ago
- jxscout superpowers JavaScript analysis for security researchersβ241Updated 3 months ago
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.β201Updated last month
- EndExt is a .go tool for extracting all the possible endpoints from the JS filesβ215Updated last year
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.β147Updated last year
- Automation of tokens/api keys testing.β135Updated 2 years ago
- β127Updated 4 years ago
- β₯β140Updated 11 months ago
- My Priv8 Nuclei Templatesβ325Updated last year
- β249Updated 4 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.β536Updated 5 months ago
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)β297Updated last year
- β152Updated last year
- Remote CLI tools at your fingertipsβ93Updated last year
- β116Updated last week
- Self-hosted bug bounty programs that are "scammy" or unethicalβ142Updated 3 months ago
- β142Updated 5 months ago