rammarj / csrf-poc-creatorLinks
A Burp Suite extension for CSRF proof of concepts.
☆52Updated 2 years ago
Alternatives and similar repositories for csrf-poc-creator
Users that are interested in csrf-poc-creator are comparing it to the libraries listed below
Sorting:
- ☆145Updated 2 years ago
- ☆51Updated 3 years ago
- Advanced Reconnaissance and Web Application Discovery☆87Updated 3 years ago
- Tips For Bug Bounty Hunters☆85Updated 3 years ago
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆108Updated 3 years ago
- Guide to SSRF☆70Updated last year
- Extract JavaScript files from burp suite project with ease.☆90Updated 3 years ago
- Check List☆81Updated 3 years ago
- The scripts I write to help me on my bug bounty hunting☆121Updated 3 years ago
- ☆81Updated 2 years ago
- Simple tool to gather domains from crt.sh using the organization name☆100Updated 3 years ago
- Enumerate Subdomains Through Google Dorks (Bypassed Page Filter)☆124Updated 2 weeks ago
- Describe how to use ffuf different options with examples☆89Updated 2 years ago
- Summary of almost all paid bounty reports on H1☆41Updated 4 years ago
- ☆113Updated 2 years ago
- ☆95Updated 3 years ago
- ☆156Updated 2 years ago
- Community curated list of template files for the nuclei engine to find security vulnerability and fingerprinting the targets.☆62Updated last year
- ☆10Updated 5 years ago
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆100Updated last year
- Prototype Pollution Scanner☆121Updated 4 years ago
- Recon-Ninja☆88Updated last year
- Real world bug bounty wordlists☆115Updated last year
- Burp-suite Extension For finding .map files☆50Updated last year
- ☆96Updated 5 years ago
- Path Traversal Vulnerability Payload List☆71Updated 2 years ago
- A reverse whois tool based on Whoxy API.☆166Updated last year
- A fast tool to scan SAAS,PAAS App written in Go☆84Updated 2 years ago
- This is a comprehensive Subdomain Enumeration Guide that traces back to my GitBook.☆31Updated 3 months ago
- Detects request smuggling via HTTP/2 downgrades.☆92Updated 2 years ago