securi3ytalent / regexHunter
regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper
☆10Updated 9 months ago
Alternatives and similar repositories for regexHunter:
Users that are interested in regexHunter are comparing it to the libraries listed below
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 4 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Updated 9 months ago
- ☆28Updated 5 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated last year
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆31Updated last year
- script python to check url list via cookies and Authorization☆19Updated 2 years ago
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Updated 7 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆23Updated last year
- ☆12Updated 3 years ago
- Authorization-Nuclei-Templates☆38Updated 5 months ago
- Tools for bug bounty☆27Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- Process URLs and remove duplicate query parameters.☆28Updated 11 months ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆25Updated last year
- ☆18Updated last year
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆42Updated 4 months ago
- A solid recon tool I use personally.☆30Updated last year
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆13Updated last year
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆53Updated 4 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆16Updated 4 years ago
- Generating Sub-Sub-Subdomain + validating all of them☆10Updated 2 years ago
- Host Header Vulnerability Scanner Automated Tool☆23Updated last year
- FireHawk: The Elite Firebase Security Testing Utility☆20Updated 9 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆30Updated last year
- Passively check for XSS character encodings☆18Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Updated last year
- This repository contains proof of concept for zero days and CVEs that were found by Omar Hashem through Security Research☆44Updated 2 years ago