optiv / mobile-nuclei-templatesLinks
☆420Updated 4 years ago
Alternatives and similar repositories for mobile-nuclei-templates
Users that are interested in mobile-nuclei-templates are comparing it to the libraries listed below
Sorting:
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆322Updated last year
- Burp extension to create target specific and tailored wordlist from burp history.☆250Updated 3 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆323Updated 4 months ago
- Unofficial documentation for the great tool Param Miner☆185Updated 3 years ago
- Useful "Match and Replace" burpsuite rules☆352Updated 2 years ago
- ☆296Updated 3 years ago
- Turbo Intruder Scripts☆226Updated 5 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆552Updated 8 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆635Updated 4 months ago
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆231Updated 3 years ago
- A Firefox Web Extension to improve the discovery of DOM XSS.☆280Updated last year
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- Burp Extension for easily creating Wordlists☆211Updated 4 years ago
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆386Updated 5 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆235Updated 3 years ago
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆343Updated 4 years ago
- ☆171Updated 4 years ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆299Updated 2 years ago
- Nuclei templates written by geeknik. Claude is my co-pilot. 🤖☆283Updated 3 months ago
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆287Updated 2 years ago
- Prototype pollution scanner using headless chrome☆219Updated 3 years ago
- ☆375Updated 4 years ago
- A tool for exploring Firebase datastores.☆231Updated 3 months ago
- Gotator is a tool to generate DNS wordlists through permutations.☆497Updated 3 years ago
- Automating XSS using Bash☆358Updated 3 weeks ago
- Default signature for Jaeles Scanner☆325Updated 3 years ago
- A fast and minimal JS endpoint extractor☆382Updated last year
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆249Updated 3 years ago
- Burpsuite plugin for Interact.sh☆228Updated last year
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆281Updated last year