odomojuli / regextokens
list of regex patterns for oauth / api tokens with provided source
☆250Updated 3 weeks ago
Alternatives and similar repositories for regextokens:
Users that are interested in regextokens are comparing it to the libraries listed below
- Secret and/or credential patterns used for gf.☆237Updated last year
- A fast and minimal JS endpoint extractor☆334Updated 2 months ago
- A collection of regexes for every possbile use☆407Updated last year
- Takes a list of URLs and returns their HTTP response codes☆390Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆465Updated 2 years ago
- The Fairly Fast Fetcher. Requests a bunch of URLs provided on stdin fairly quickly.☆392Updated 9 months ago
- Go scripts for checking API key / access token validity☆215Updated 3 years ago
- Golang client for querying SecurityTrails API data☆545Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆301Updated 2 months ago
- Scrape domain names from SSL certificates of arbitrary hosts☆629Updated 10 months ago
- Blind XSS Scanner is a tool that can be used to scan for blind XSS vulnerabilities in web applications.☆253Updated 2 months ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆297Updated last year
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆318Updated 3 months ago
- Small tool to Grab subdomains using Shodan api.☆386Updated 3 months ago
- Burp extension to create target specific and tailored wordlist from burp history.☆233Updated 3 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆207Updated 4 years ago
- A DNS Bruteforcing Wordlist Generator☆350Updated last year
- ☆370Updated 3 years ago
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆216Updated 2 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆619Updated 2 months ago
- Heuristic Vulnerable Parameter Scanner☆578Updated last year
- Turns any junk text into a usable wordlist for brute-forcing.☆218Updated 10 months ago
- A tool to check a bunch of URLs that contain reflecting params.☆557Updated 5 months ago
- Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.☆665Updated last year
- You can read the writeup on this script here☆269Updated 4 years ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆501Updated 2 years ago
- Random utilities from my security projects that might be useful to others☆176Updated this week
- Vulnerability Scan with Nuclei☆247Updated 2 months ago
- Rust-based high performance domain permutation generator.☆280Updated last year
- Get related domains / subdomains by looking at Google Analytics IDs☆242Updated 2 years ago