securi3ytalent / regexHunter
regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper
☆9Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for regexHunter
- FireHawk: The Elite Firebase Security Testing Utility☆18Updated 5 months ago
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆19Updated last week
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Updated 5 months ago
- ☆16Updated last year
- My personal collection of nuclei templates made for fuzzing.☆25Updated 2 months ago
- Filter URLs to save your time.☆59Updated 2 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆23Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆20Updated 9 months ago
- A BurpSuite extension for vulnerability Scanning☆25Updated 8 months ago
- This tool allows you to find ssti vulnerability with ease!☆19Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆31Updated 11 months ago
- ☆13Updated 7 months ago
- ☆21Updated 2 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated last year
- ☆12Updated 2 years ago
- PathBuster - multiple hosts Web path scanner☆22Updated 5 months ago
- Automated HTTP Request Repeating With Burp Suite☆34Updated last year
- OSCP_OSWA_OSED_OSEP_OSWE☆7Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- XSS Finder Via SSTI☆54Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated 9 months ago
- ☆20Updated last year
- Recon scripts for Red Team and Web blackbox auditing☆29Updated last week
- ☆27Updated last month
- Template Nuclei SSTI☆28Updated last year
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆16Updated 3 years ago