sdushantha / doraLinks
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
☆336Updated last year
Alternatives and similar repositories for dora
Users that are interested in dora are comparing it to the libraries listed below
Sorting:
- Jbin will gather all the URLs from the website and then it will try to expose the secret data from them such as API keys, API secrets, AP…☆162Updated 2 years ago
- Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.☆243Updated 2 months ago
- Heuristic Vulnerable Parameter Scanner☆592Updated last year
- BugBountyTips☆409Updated last month
- Generate Email, Register for anything, Get the OTP/Link☆589Updated last year
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a …☆610Updated 2 weeks ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆284Updated 8 months ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆906Updated last month
- Astra is a tool to find URLs and secrets inside a webpage/files☆210Updated 2 years ago
- Open Redirection Analyzer☆782Updated 2 years ago
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆315Updated 3 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆346Updated last year
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆262Updated 9 months ago
- Subdomain finder☆368Updated 11 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆973Updated 11 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆647Updated 2 years ago
- Http request smuggling vulnerability scanner☆227Updated 2 years ago
- oneliner commands for bug bounties☆446Updated 2 years ago
- a javascript change monitoring tool for bugbounties☆648Updated 10 months ago
- Golang client for querying SecurityTrails API data☆559Updated last year
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆533Updated last year
- Wordlists handcrafted (and automated) with ♥☆219Updated 2 months ago
- XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|ID…☆336Updated last year
- Scan only once by IP address and reduce scan times with Nmap for large amounts of data.☆388Updated last month
- bypass-url-parser☆1,073Updated this week
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆198Updated 3 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆856Updated 2 weeks ago
- Automated Recon for Pentesting & Bug Bounty☆420Updated last year
- list of regex patterns for oauth / api tokens with provided source☆263Updated 4 months ago
- Subdomain and target enumeration tool built for offensive security testing☆877Updated 11 months ago