sea-erkin / log-snareView external linksLinks
LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.
☆33Mar 4, 2024Updated last year
Alternatives and similar repositories for log-snare
Users that are interested in log-snare are comparing it to the libraries listed below
Sorting:
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Mar 20, 2024Updated last year
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 4 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆15Jun 22, 2024Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated last year
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- ☆25Dec 28, 2023Updated 2 years ago
- ☆47May 31, 2024Updated last year
- ☆13Sep 8, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Tools for bug bounty☆29Jul 9, 2025Updated 7 months ago
- A Firefox Web Extension to improve the discovery of DOM XSS.☆285Nov 13, 2024Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆62Feb 14, 2025Updated last year
- ☆138Nov 9, 2024Updated last year
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆143Jun 27, 2023Updated 2 years ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- Collection of templates from various resources☆42Dec 5, 2025Updated 2 months ago
- ☆69Aug 19, 2024Updated last year
- Find subdomains on GitLab.☆106Apr 28, 2024Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.☆17Apr 10, 2023Updated 2 years ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆20Jan 13, 2025Updated last year
- Automatically look for paramater reflections in the HTTP response☆17Apr 30, 2025Updated 9 months ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Fuzz 401/403/404 pages for bypasses☆386Jan 22, 2026Updated 3 weeks ago
- AI Powered Terminal Based Ethical Hacking Assistant☆88Feb 3, 2025Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Oct 28, 2025Updated 3 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- VulnBox is a container that is intentionally designed with vulnerabilities to allow security professionals to practice and improve their …☆17Aug 23, 2024Updated last year
- ☆47Jan 14, 2024Updated 2 years ago
- ☆35Aug 5, 2025Updated 6 months ago
- Discover hidden debugging parameters and uncover web application secrets☆247Feb 4, 2026Updated last week