reconmap / rest-api
REST API backend for Reconmap
☆47Updated this week
Related projects ⓘ
Alternatives and complementary repositories for rest-api
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆52Updated this week
- A list of "secrets" from JWT sample code and readme files.☆51Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆56Updated 4 years ago
- ☆47Updated 3 years ago
- ☆50Updated 2 weeks ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆39Updated 4 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆39Updated last year
- Tool for making it easy to collect dns results from the CLI☆39Updated 3 months ago
- HP Data Protector Arbitrary Remote Command Execution☆11Updated 6 years ago
- Copy as XMLHttpRequest BurpSuite extension☆30Updated 3 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆74Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆37Updated 2 years ago
- Use normal web pentest tools to hack Websockets☆18Updated 5 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Updated 5 years ago
- ☆75Updated 3 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Updated 3 years ago
- Another Subdomain ENumeration Tool☆10Updated 2 years ago
- Get all possible href | src | url from target url or domain☆41Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- ☆64Updated 6 years ago
- ☆45Updated 7 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Go fish for AWS EIPs☆46Updated 3 years ago
- Searching for virtual hosts among non-resolvable domains☆86Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆61Updated 4 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆69Updated 4 months ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 2 years ago