rverton / wonitor
fast, zero config web endpoint change monitor
☆43Updated 4 years ago
Alternatives and similar repositories for wonitor:
Users that are interested in wonitor are comparing it to the libraries listed below
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Updated 3 years ago
- A basic golang server/client for distributing tasks over multiple systems.☆38Updated 4 years ago
- Security checks for http headers and cookies☆25Updated 4 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Updated last year
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- A program to map out SPF and DKIM records for a large number of domains☆38Updated 10 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Updated 4 years ago
- A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash / Shitrix☆35Updated 5 years ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30Updated 5 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- Blind XSS service alerting over slack or email☆32Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Secrets detection based on regular expressions.☆22Updated 3 weeks ago
- Go fish for AWS EIPs☆46Updated 4 years ago
- Query various sources for CVE proof-of-concepts☆51Updated last year
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- A better dns bruteforcer written in golang☆13Updated 6 years ago
- Jast (Just Another Screenshot Tool)☆10Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Send notifications on different channels such as Slack, Telegram, Discord etc.☆39Updated 2 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆27Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- ☆13Updated last year
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- ☆56Updated 4 years ago
- Presentation presented at DEFCON 27 PHV☆27Updated 5 years ago
- A Broken-URL Checker☆79Updated 7 years ago