sdushantha / doraLinks
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
☆336Updated last year
Alternatives and similar repositories for dora
Users that are interested in dora are comparing it to the libraries listed below
Sorting:
- Subdomain finder☆369Updated last year
- Automated Recon for Pentesting & Bug Bounty☆425Updated last year
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆263Updated last year
- Jbin will gather all the URLs from the website and then it will try to expose the secret data from them such as API keys, API secrets, AP…☆164Updated 3 years ago
- Turns any junk text into a usable wordlist for brute-forcing.☆220Updated last year
- ☆394Updated 3 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆878Updated 3 months ago
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆316Updated 3 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆357Updated 2 years ago
- Get related domains / subdomains by looking at Google Analytics IDs☆249Updated 3 years ago
- Recon is a script to perform a full recon on a target with the main tools to search for vulnerabilities. Created based on @ofjaaah and @J…☆207Updated 3 years ago
- Astra is a tool to find URLs and secrets inside a webpage/files☆213Updated 2 years ago
- Free, libre, effective, and data-driven wordlists for all!☆624Updated 3 years ago
- Heuristic Vulnerable Parameter Scanner☆596Updated last year
- Takes a list of URLs and returns their HTTP response codes☆399Updated last year
- A fast and minimal JS endpoint extractor☆369Updated 9 months ago
- Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated files…☆687Updated last year
- Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.☆249Updated 5 months ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆435Updated 2 weeks ago
- Find subdomains with GPT, for free☆350Updated last year
- Http request smuggling vulnerability scanner☆228Updated 3 years ago
- Golang client for querying SecurityTrails API data☆566Updated last year
- Generate tens of thousands of subdomain combinations in a matter of seconds☆269Updated last year
- A Firefox Web Extension to improve the discovery of DOM XSS.☆276Updated 9 months ago
- List of regex for scraping secret API keys and juicy information.☆709Updated 3 years ago
- Little Bug Bounty & Hacking Tools⚔️☆363Updated 9 months ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆450Updated 3 years ago
- A Security Tool for Enumerating WebSockets☆360Updated 3 years ago
- GraphQL automated security testing toolkit☆324Updated last year
- A collection of hacker tools using HackerOne's API☆270Updated 3 years ago