pruzko / hakuinView external linksLinks
A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.
☆141Jun 7, 2025Updated 8 months ago
Alternatives and similar repositories for hakuin
Users that are interested in hakuin are comparing it to the libraries listed below
Sorting:
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆282Sep 11, 2025Updated 5 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- Secrets scanner that understands code☆192Nov 2, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆103Feb 9, 2024Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Simple PoC for demonstrating Race Conditions on Websockets☆55Sep 14, 2023Updated 2 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆61Jun 12, 2023Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆15Jun 22, 2024Updated last year
- ☆13Mar 1, 2024Updated last year
- 这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)☆17Dec 10, 2024Updated last year
- A source code static analysis platform for AppSec enthusiasts.☆267Dec 8, 2025Updated 2 months ago
- Burp Suite Extension - Trigger actions and reshape HTTP request/response and WebSocket traffic using configurable rules☆107Nov 16, 2025Updated 3 months ago
- An extension to use Semgrep inside Burp Suite.☆89May 23, 2025Updated 8 months ago
- Black box fuzzer for web applications☆437Jul 20, 2025Updated 6 months ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Nov 8, 2025Updated 3 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆28Feb 8, 2023Updated 3 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated 11 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆103Dec 8, 2025Updated 2 months ago
- ☆43Jan 2, 2023Updated 3 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆140Dec 7, 2024Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆438Dec 30, 2025Updated last month
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 2 months ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- An XSS Exploitation Tool☆337Dec 5, 2025Updated 2 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87May 11, 2024Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Feb 10, 2026Updated last week
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,288Aug 7, 2025Updated 6 months ago
- Unleash the power of cloud☆821Nov 19, 2024Updated last year
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago