mikehacksthings / jast
Jast (Just Another Screenshot Tool)
☆10Updated 5 years ago
Alternatives and similar repositories for jast:
Users that are interested in jast are comparing it to the libraries listed below
- Secrets detection based on regular expressions.☆22Updated 2 years ago
- Scan and import relevant requests directly to burp!☆9Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- View screenshots as a slideshow over http☆15Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 4 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆15Updated 4 years ago
- Simple proxy which applies filters (default or custom) to your requests and responses, while you browse a website.☆8Updated 3 years ago
- Simple webinterface combining different recon tools.☆12Updated 7 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- Take a list of URIs and print all the of the paths☆10Updated 4 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Updated 6 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- burp extender for fuzzing☆10Updated 6 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- A better dns bruteforcer written in golang☆13Updated 6 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Scripts that I've written that others may find useful☆14Updated 2 years ago
- Validate proxies for specific domain☆35Updated 3 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago
- ☆12Updated 3 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago