mzfr / liffyLinks
Local file inclusion exploitation tool
☆917Updated 3 months ago
Alternatives and similar repositories for liffy
Users that are interested in liffy are comparing it to the libraries listed below
Sorting:
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,272Updated 11 months ago
- An automated SSRF finder. Just give the domain name and your server and chill! ;) Also has options to find XSS and open redirects☆967Updated 4 years ago
- Making Favicon.ico based Recon Great again !☆1,258Updated 2 years ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,276Updated last year
- A fuzzer for detecting open redirect vulnerabilities☆780Updated last year
- Open Redirection Analyzer☆806Updated 2 years ago
- Tool to help exploit XXE vulnerabilities☆573Updated 2 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆753Updated 2 years ago
- A wordlist of API names for web application assessments☆862Updated 7 months ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆578Updated 3 years ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆916Updated 2 months ago
- XSS payloads designed to turn alert(1) into P1☆1,388Updated 2 years ago
- Open Redirect Payloads☆647Updated last year
- Fetches javascript file from a list of URLS or subdomains.☆828Updated 6 months ago
- Web App bug hunting☆577Updated 2 months ago
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,279Updated 4 months ago
- A fast DOM based XSS vulnerability scanner with simplicity.☆846Updated 3 years ago
- Automation for javascript recon in bug bounty.☆1,063Updated 2 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,765Updated last year
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,010Updated last year
- Quick SQLMap Tamper Suggester☆1,392Updated 3 years ago
- Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists☆764Updated 2 years ago
- Electron JS Browser To Find XSS Vulnerabilities Automatically☆746Updated 4 years ago
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and…☆801Updated 2 years ago
- DNSGen is a powerful and flexible DNS name permutation tool designed for security researchers and penetration testers. It generates intel…☆1,037Updated last year
- Heuristic Vulnerable Parameter Scanner☆601Updated 2 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆773Updated 3 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,280Updated 5 months ago
- Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated files…☆685Updated last year
- A Powerful Subdomain Takeover Tool☆960Updated 2 years ago