s0md3v / wlLinks
convert case style of words
☆50Updated last year
Alternatives and similar repositories for wl
Users that are interested in wl are comparing it to the libraries listed below
Sorting:
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆91Updated 7 months ago
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆52Updated 2 years ago
- A simple plugin to export JS files from one or multiple targets☆43Updated last year
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Updated last year
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆42Updated 2 years ago
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- ☆35Updated 10 months ago
- Supertruder but better☆31Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 9 months ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆140Updated last year
- Identify virtual hosts by similarity comparison☆129Updated last year
- ☆64Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆33Updated last year
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆50Updated 2 years ago
- Find subdomains on GitLab.☆103Updated last year
- ☆110Updated 2 years ago
- ai-based domain name generation☆95Updated 8 months ago
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search qu…☆27Updated 3 months ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆38Updated last year
- Gather results of dorks across a number of search engines☆142Updated 5 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆40Updated 2 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆37Updated last month
- A proof of concept program that pulls and parses security.txt files at mass.☆28Updated 2 years ago
- Process URLs and remove duplicate query parameters.☆28Updated last year
- IIS shortname scanner + bruteforce☆54Updated last year
- A really fast http prober.☆41Updated last year
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆58Updated 11 months ago
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆43Updated 2 years ago
- This Chromium extension scans the page for external iFrames, Scripts, and Styles, logs them to the console, and checks if their domains a…☆54Updated 9 months ago