reconmap / rest-apiLinks
REST API backend for Reconmap
☆46Updated last week
Alternatives and similar repositories for rest-api
Users that are interested in rest-api are comparing it to the libraries listed below
Sorting:
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆57Updated 5 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Updated 5 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated last week
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Another Subdomain ENumeration Tool☆13Updated 3 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 5 years ago
- ☆72Updated 7 years ago
- A list of "secrets" from JWT sample code and readme files.☆57Updated 5 years ago
- ☆48Updated 4 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆93Updated 2 weeks ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75Updated 5 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- ☆26Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- ☆46Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 4 years ago
- ☆38Updated 4 years ago
- ☆76Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆40Updated 2 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆71Updated last year
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 5 years ago