optiv / mobile-nuclei-templatesLinks
☆413Updated 4 years ago
Alternatives and similar repositories for mobile-nuclei-templates
Users that are interested in mobile-nuclei-templates are comparing it to the libraries listed below
Sorting:
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆304Updated last year
- Unofficial documentation for the great tool Param Miner☆179Updated 2 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆314Updated last week
- Burp extension to create target specific and tailored wordlist from burp history.☆243Updated 3 years ago
- List of reporting templates I have used since I started doing BBH.☆307Updated 9 months ago
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆228Updated 3 years ago
- ☆294Updated 2 years ago
- Useful "Match and Replace" burpsuite rules☆348Updated last year
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆519Updated 4 months ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆231Updated 3 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆627Updated last week
- A Firefox Web Extension to improve the discovery of DOM XSS.☆273Updated 8 months ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆512Updated 3 years ago
- Burp Suite extension that offers a toolkit for testing GraphQL endpoints.☆193Updated 11 months ago
- Turbo Intruder Scripts☆221Updated 5 years ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆292Updated 2 years ago
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆370Updated 5 years ago
- IIS shortname scanner written in Go☆336Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆316Updated last year
- Burpsuite plugin for Interact.sh☆223Updated last year
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆337Updated 4 years ago
- Nuclei templates written by us.☆272Updated 3 years ago
- Burp Extension for easily creating Wordlists☆211Updated 3 years ago
- Js File Scanner☆168Updated 3 years ago
- Secret and/or credential patterns used for gf.☆241Updated 2 years ago
- Automated learning of regexes for DNS discovery☆371Updated 2 years ago
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆276Updated last year
- ☆173Updated 4 years ago
- Automating XSS using Bash☆355Updated last year
- a javascript change monitoring tool for bugbounties☆655Updated 11 months ago