pentesterland / Log4Shell
☆67Updated 3 years ago
Alternatives and similar repositories for Log4Shell:
Users that are interested in Log4Shell are comparing it to the libraries listed below
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- 🔠Collection of regexp pattern for security passive scanning☆115Updated 2 years ago
- ☆65Updated 2 years ago
- Identify virtual hosts by similarity comparison☆118Updated 7 months ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆56Updated 4 years ago
- Directory scans☆82Updated last year
- Striping CDN IPs from a list of IP Addresses☆75Updated 2 years ago
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆59Updated last year
- Prototype Pollution Scanner☆113Updated 3 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Extract JavaScript files from burp suite project with ease.☆88Updated 3 years ago
- ☆77Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆140Updated last year
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- Check AWS S3 instances for read/write/delete access☆120Updated 3 years ago
- PoC for XSS in org.webjars:swagger-ui [3.14.2, 3.36.2]☆53Updated 2 years ago
- ☆111Updated 2 years ago
- Collection's of Tech Talk that are presented by me :)☆96Updated 2 months ago
- Enumerate Subdomains Through Google Dorks☆123Updated 2 weeks ago
- Vulnerable Code Snippets☆45Updated 2 years ago
- ☆53Updated 2 years ago
- Real world bug bounty wordlists☆111Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆118Updated last year
- ☆156Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆70Updated 3 years ago
- Detects request smuggling via HTTP/2 downgrades.☆92Updated 2 years ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆64Updated last year
- ☆60Updated 2 years ago