reconmap / rest-api
REST API backend for Reconmap
☆46Updated 2 weeks ago
Alternatives and similar repositories for rest-api:
Users that are interested in rest-api are comparing it to the libraries listed below
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated this week
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- ☆48Updated 4 years ago
- Find the remote website version based on a git repository☆126Updated 3 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆39Updated 4 years ago
- OSWE Preparation☆37Updated 5 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆74Updated 4 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆71Updated 8 months ago
- Another Subdomain ENumeration Tool☆11Updated 2 years ago
- ☆26Updated 2 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- ☆52Updated 5 months ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 5 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Go fish for AWS EIPs☆46Updated 4 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Updated 6 years ago
- Checks if files is accessible based on the source code.☆16Updated last year
- Use normal web pentest tools to hack Websockets☆18Updated 5 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆62Updated 3 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆54Updated 4 years ago
- ☆47Updated 4 years ago
- ☆37Updated 3 years ago
- Scripts to extract files from SCM directories left on web servers☆36Updated last year
- A simple remote scanner for Atlassian Jira☆120Updated 2 years ago
- A collection of simple tools and poc-builders☆39Updated this week
- Kubernetes Scanner☆40Updated 3 years ago