sea-erkin / log-snare
LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.
☆31Updated last year
Alternatives and similar repositories for log-snare:
Users that are interested in log-snare are comparing it to the libraries listed below
- Custom nuclei templates for bug hunting.....☆25Updated 10 months ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 7 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 8 months ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆34Updated 5 months ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Updated 9 months ago
- Advanced test for proxy & waf☆13Updated 7 months ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- ☆17Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated 10 months ago
- A Burp Extension that makes it easier to view all script code on a Response.☆16Updated last year
- Looks for parameters in urls☆34Updated 6 months ago
- Top disclosed reports from HackerOne☆12Updated this week
- Process URLs and remove duplicate query parameters.☆28Updated last year
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Updated 2 years ago
- Ollama AI Analyzer runs directly on your local computer, using Ollama's AI models to analyze your HTTP requests and responses. This means…☆27Updated last month
- Mine URLs from Browser's Heap Snapshot for fun and profit☆64Updated last year
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Updated last year
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Web cache poisoning vulnerability scanner.☆65Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- bash script for automating subdomain enumeration process either passive or active☆27Updated 4 months ago
- Get list of subsidiaries for a selected company☆27Updated 4 months ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Enhanced 403 bypass header☆21Updated 2 years ago
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 4 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆24Updated 2 years ago
- Template Nuclei SSTI☆29Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆14Updated last month
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆16Updated 4 years ago