pentesterland / Log4Shell
☆68Updated 3 years ago
Alternatives and similar repositories for Log4Shell
Users that are interested in Log4Shell are comparing it to the libraries listed below
Sorting:
- Check AWS S3 instances for read/write/delete access☆121Updated 3 years ago
- ☆65Updated 2 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- Web cache poisoning vulnerability scanner.☆66Updated 3 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆119Updated last year
- 🔭 Collection of regexp pattern for security passive scanning☆114Updated 2 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆58Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- Identify virtual hosts by similarity comparison☆121Updated 9 months ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Extract JavaScript files from burp suite project with ease.☆89Updated 3 years ago
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆44Updated 11 months ago
- Execute Trickest workflows right from your terminal☆91Updated last week
- Prototype Pollution Scanner☆117Updated 4 years ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆77Updated last year
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 2 years ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆63Updated last year
- Striping CDN & WAF IPs from a list of IP Addresses☆77Updated last week
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆136Updated 8 months ago
- ☆74Updated last year
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆58Updated 4 years ago
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆127Updated 10 months ago
- Vulnerable Code Snippets☆45Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Updated 2 years ago
- Build OpenApi specs for your APIs from Burp's traffic using Levo.ai. Also detect the PII in your APIs.☆30Updated last month
- ☆55Updated 2 years ago
- PoC for XSS in org.webjars:swagger-ui [3.14.2, 3.36.2]☆52Updated 2 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago