rootcathacking / catspin
Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway and deployed via AWS Cloudformation.
☆261Updated last year
Alternatives and similar repositories for catspin:
Users that are interested in catspin are comparing it to the libraries listed below
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year
- A suite for hunting suspicious targets, expose domains and phishing discovery☆358Updated this week
- Local File Inclusion discovery and exploitation tool☆300Updated 3 months ago
- Search for sensitive data in Postman public library.☆204Updated 3 months ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆409Updated last year
- Session Hijacking Visual Exploitation☆198Updated last year
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆343Updated last month
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆356Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆544Updated 5 months ago
- ☆315Updated this week
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆241Updated last month
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆156Updated 4 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆357Updated last week
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆443Updated 2 years ago
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆324Updated last month
- ☆481Updated 11 months ago
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆217Updated 7 months ago
- ☆523Updated 9 months ago
- ☆119Updated last year
- Fuzz 401/403/404 pages for bypasses☆305Updated 4 months ago
- Opensource assets and vulnerability scanning tool☆163Updated 2 months ago
- Discover new target domains using Content Security Policy☆418Updated this week
- The Most Advanced Client-Side Prototype Pollution Scanner☆219Updated this week
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated last year
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆84Updated last year
- Custom scan profiles for use with Burp Suite Pro☆141Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆373Updated 3 months ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆297Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆335Updated last year
- AI-powered ffuf wrapper☆468Updated 5 months ago