SAPLAR - LFI & Path Traversal Scanner
☆15Mar 11, 2025Updated last year
Alternatives and similar repositories for SAPLAR
Users that are interested in SAPLAR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated 2 years ago
- ☆91Mar 17, 2025Updated last year
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 3 months ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 6 months ago
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated 2 months ago
- ☆23Mar 22, 2025Updated last year
- ☆45Mar 5, 2025Updated last year
- 🔍 SubWatch – Automated Subdomain Monitoring Script☆41Jun 13, 2025Updated 9 months ago
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆27Apr 30, 2025Updated 10 months ago
- My Powershell Scripts☆20Feb 8, 2026Updated last month
- ☆16Jan 23, 2026Updated 2 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆265Jul 6, 2025Updated 8 months ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆35Jan 4, 2026Updated 2 months ago
- A passive way to find backups/ sensitive information.☆89Jul 10, 2025Updated 8 months ago
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆62Sep 4, 2024Updated last year
- A list of all Active Directory machines from HackTheBox☆221Mar 2, 2026Updated 3 weeks ago
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated 11 months ago
- ☆54Jun 22, 2025Updated 9 months ago
- A fast subdomain takeover tool☆86Nov 10, 2023Updated 2 years ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- ☆15Mar 21, 2025Updated last year
- ☆14Nov 8, 2024Updated last year
- collectvars collects JavaScript variables, highlights risky ones, and helps you understand code structure, while you casually browse.☆33Aug 28, 2024Updated last year
- Process URLs and remove duplicate query parameters.☆27Mar 19, 2024Updated 2 years ago
- ☆21Feb 10, 2026Updated last month
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆53Jul 17, 2025Updated 8 months ago
- High-Performance JavaScript Security Scanner - Process 1M URLs in ~5 hours with Telegram & Discord bot integration, Docker support, and c…☆171Oct 18, 2025Updated 5 months ago
- Firebase_Checker is Python tool to analyze APK files and web applications for Firebase-related vulnerabilities. This tool identifies secu…☆56Nov 6, 2025Updated 4 months ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- ☆29May 22, 2024Updated last year
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago