rootcathacking / catspin
Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway and deployed via AWS Cloudformation.
☆259Updated last year
Alternatives and similar repositories for catspin:
Users that are interested in catspin are comparing it to the libraries listed below
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆403Updated last year
- Session Hijacking Visual Exploitation☆197Updated last year
- Search for sensitive data in Postman public library.☆203Updated 3 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆332Updated last year
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆241Updated 2 weeks ago
- Local File Inclusion discovery and exploitation tool☆295Updated 3 months ago
- ☆521Updated 9 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆405Updated 2 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆355Updated 3 weeks ago
- AI-powered ffuf wrapper☆303Updated 4 months ago
- Nuclei templates for honeypots detection.☆195Updated last year
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆234Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆146Updated 10 months ago
- ☆475Updated 11 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆539Updated 4 months ago
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆321Updated last week
- Find subdomains with GPT, for free☆337Updated 11 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆148Updated 4 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆355Updated last week
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆342Updated 3 weeks ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆297Updated last year
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆236Updated last month
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆598Updated last year
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆353Updated last year
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆346Updated 4 months ago
- Shodan Dorks 2023☆231Updated 2 months ago
- Self-hosted passive subdomain continous monitoring tool.☆160Updated last year
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆155Updated 4 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆170Updated 5 months ago