odomojuli / regextokensLinks
list of regex patterns for oauth / api tokens with provided source
☆263Updated 4 months ago
Alternatives and similar repositories for regextokens
Users that are interested in regextokens are comparing it to the libraries listed below
Sorting:
- A collection of regexes for every possbile use☆423Updated last year
- Takes a list of URLs and returns their HTTP response codes☆395Updated last year
- ☆410Updated 4 years ago
- A DNS Bruteforcing Wordlist Generator☆357Updated 2 years ago
- Secret and/or credential patterns used for gf.☆240Updated 2 years ago
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆222Updated 3 years ago
- Golang client for querying SecurityTrails API data☆559Updated last year
- A fast and minimal JS endpoint extractor☆354Updated 6 months ago
- Blind XSS Scanner is a tool that can be used to scan for blind XSS vulnerabilities in web applications.☆311Updated last week
- BugBountyTips☆409Updated last month
- Heuristic Vulnerable Parameter Scanner☆592Updated last year
- Rust-based high performance domain permutation generator.☆287Updated last year
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆262Updated 9 months ago
- A tool to check a bunch of URLs that contain reflecting params.☆577Updated 10 months ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆270Updated last year
- Random utilities from my security projects that might be useful to others☆180Updated 4 months ago
- Gotator is a tool to generate DNS wordlists through permutations.☆478Updated 2 years ago
- The Fairly Fast Fetcher. Requests a bunch of URLs provided on stdin fairly quickly.☆404Updated last year
- ☆374Updated 3 years ago
- information gathering☆277Updated last year
- Open Redirection Analyzer☆782Updated 2 years ago
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆332Updated 3 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆231Updated 3 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆312Updated 6 months ago
- Prototype pollution scanner using headless chrome☆218Updated 2 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆249Updated 3 weeks ago
- Fetches javascript file from a list of URLS or subdomains.☆775Updated 2 years ago
- List of periodically validated public DNS resolvers☆232Updated this week
- Go scripts for checking API key / access token validity☆216Updated 3 years ago
- Automated learning of regexes for DNS discovery☆369Updated 2 years ago