mrofisr / gf-patternsLinks
A collection of useful grep patterns and tools by Tomnomnom for extracting specific values from text.
☆45Updated 2 months ago
Alternatives and similar repositories for gf-patterns
Users that are interested in gf-patterns are comparing it to the libraries listed below
Sorting:
- IIS shortname scanner + bruteforce☆52Updated last year
- It grep subdomains, email/username, build custom wordlist etc from gau results☆48Updated 2 years ago
- Some of the gf patterns which i use☆43Updated 3 years ago
- ☆79Updated 2 years ago
- The project aims at creating target-specific wordlists for any web application that you are testing.☆66Updated 3 years ago
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆48Updated 2 years ago
- ☆155Updated 2 years ago
- A fast tool to scan SAAS,PAAS App written in Go☆84Updated 2 years ago
- ☆67Updated 2 years ago
- A Proof of Concept for Clickjacking Attacks☆57Updated 4 years ago
- ☆95Updated 3 years ago
- ☆76Updated last year
- Some wordlists collected form github to all bug bounty hunters.☆31Updated 3 years ago
- ☆51Updated 3 years ago
- Basic Bash Script to scrape all subdomains from crtsh in a single run☆19Updated 3 years ago
- Find secret keys from JS file☆51Updated 2 years ago
- s3 brute force tool☆44Updated 4 years ago
- Extract JavaScript files from burp suite project with ease.☆90Updated 3 years ago
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- Check List☆80Updated 2 years ago
- golang tool to scan domains or single domains with know security issues against xmlrpc☆62Updated last year
- This Burp extension extracts various data (path, parameter keys, parameter values, subdomains, etc.) from the sitemap. This data is used …☆36Updated 3 years ago
- ☆32Updated 2 years ago
- Prototype Pollution Scanner☆120Updated 4 years ago
- ☆95Updated 2 years ago
- ☆34Updated 4 years ago
- Remove duplicate urls from input☆56Updated 3 years ago
- Simple tool to gather domains from crt.sh using the organization name☆100Updated 3 years ago
- ☆67Updated 10 months ago
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆40Updated 2 years ago