nightwatchcybersecurity / gitbleed_tools
☆90Updated 3 years ago
Alternatives and similar repositories for gitbleed_tools:
Users that are interested in gitbleed_tools are comparing it to the libraries listed below
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆49Updated 2 years ago
- Go fish for AWS EIPs☆46Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- Find the remote website version based on a git repository☆125Updated 3 years ago
- Tool for making it easy to collect dns results from the CLI☆40Updated 7 months ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 2 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 3 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 5 years ago
- Get all the CNs from a list of domains☆46Updated 3 years ago
- ☆17Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 3 years ago
- ☆48Updated 4 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆62Updated 3 years ago
- ☆37Updated 3 years ago
- ☆44Updated 4 years ago
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- Find orphaned IP's on cloud services☆29Updated 5 years ago
- ☆22Updated 2 years ago
- Burp extension for quickly copying request/response data.☆29Updated 2 weeks ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 6 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- Security checks for http headers and cookies☆24Updated 4 years ago
- ☆59Updated 8 months ago
- A collection of BBRF agents that can be deployed to AWS lambda☆22Updated 4 months ago
- CircleCI log and security configuration automations☆22Updated 4 years ago
- Use normal web pentest tools to hack Websockets☆18Updated 5 years ago
- Basic implementation of certstream to print new subdomains and domains☆36Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 2 months ago