pownjs / leaksLinks
Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.
☆28Updated 2 years ago
Alternatives and similar repositories for leaks
Users that are interested in leaks are comparing it to the libraries listed below
Sorting:
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- A natural evolution of Burp Suite's Repeater tool☆93Updated last year
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- ☆29Updated 8 years ago
- Scripts to extract files from SCM directories left on web servers☆36Updated 2 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆85Updated 5 years ago
- Burp Suite extension to track vulnerability assessment progress☆59Updated 5 years ago
- Another Subdomain ENumeration Tool☆12Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- learning case to prepare OSWE☆37Updated 5 years ago
- Words list generator to crack security tokens☆110Updated 5 years ago
- ☆67Updated 6 years ago
- AWS Security Checks☆40Updated 7 years ago
- A tool to evaluate Content Security Policies.☆72Updated 5 years ago
- A subdomain reconnaissance scanner☆35Updated 2 years ago
- ☆76Updated 4 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 7 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 7 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago