pownjs / leaksLinks
Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.
☆28Updated 3 years ago
Alternatives and similar repositories for leaks
Users that are interested in leaks are comparing it to the libraries listed below
Sorting:
- Clickjacking PoC Generator☆35Updated 5 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Another Subdomain ENumeration Tool☆12Updated 3 years ago
- A natural evolution of Burp Suite's Repeater tool☆93Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆39Updated 7 years ago
- Scripts to extract files from SCM directories left on web servers☆36Updated 2 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- learning case to prepare OSWE☆37Updated 6 years ago
- ☆29Updated 8 years ago
- AWS Security Checks☆40Updated 7 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 7 years ago
- Burp extension for quickly copying request/response data.☆30Updated 3 months ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆55Updated 5 years ago
- Burp Suite extension to track vulnerability assessment progress☆59Updated 5 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 8 years ago
- A lab to play with authentication and authorisation problems☆98Updated 2 years ago
- A subdomain reconnaissance scanner☆36Updated 2 years ago
- REST API backend for Reconmap☆47Updated this week
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- The Outlook HTML Leak Test Project☆41Updated 7 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 6 years ago
- ☆70Updated 7 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago