odomojuli / regextokensLinks
list of regex patterns for oauth / api tokens with provided source
☆279Updated last year
Alternatives and similar repositories for regextokens
Users that are interested in regextokens are comparing it to the libraries listed below
Sorting:
- A collection of regexes for every possbile use☆437Updated 2 years ago
- Takes a list of URLs and returns their HTTP response codes☆402Updated 2 years ago
- Secret and/or credential patterns used for gf.☆243Updated 2 years ago
- Go scripts for checking API key / access token validity☆220Updated 4 years ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆301Updated 2 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆234Updated 4 years ago
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆325Updated last year
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆265Updated 3 weeks ago
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆238Updated 3 years ago
- xss development frameworks, with the goal of making payload writing easier.☆152Updated last year
- A Firefox Web Extension to improve the discovery of DOM XSS.☆287Updated last year
- The Serverless Blind XSS App☆339Updated 8 months ago
- Rust-based high performance domain permutation generator.☆296Updated 2 years ago
- Random utilities from my security projects that might be useful to others☆183Updated last year
- Unofficial documentation for the great tool Param Miner☆185Updated 3 years ago
- Prototype pollution scanner using headless chrome☆219Updated 3 years ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆283Updated last year
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆348Updated 4 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆327Updated 6 months ago
- A fast and minimal JS endpoint extractor☆386Updated last year
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆218Updated 5 years ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆404Updated 4 years ago
- Urls de-duplication tool for better recon.☆145Updated 8 months ago
- Scrapts Scrapts Scrapts☆239Updated last year
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- ☆419Updated 4 years ago
- Find endpoints on GitHub.☆214Updated 2 years ago
- A blind XSS detection and XSS data capture framework☆175Updated last month
- Customisable and automated HTTP header injection☆271Updated last year
- GraphQL automated security testing toolkit☆332Updated last year