sherlock-ohm / burpscanLinks
☆95Updated 10 months ago
Alternatives and similar repositories for burpscan
Users that are interested in burpscan are comparing it to the libraries listed below
Sorting:
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆108Updated 5 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆124Updated last year
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆55Updated last year
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 7 months ago
- ☆47Updated 10 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆331Updated 3 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆104Updated 6 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Updated 4 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆66Updated 7 months ago
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆102Updated this week
- SubOwner - A Simple tool check for subdomain takeovers.☆116Updated last year
- A passive way to find backups/ sensitive information.☆87Updated 6 months ago
- ☆79Updated 8 months ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆100Updated last year
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆225Updated 5 months ago
- A Powerful Recon Engine☆68Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Updated 11 months ago
- A tool for inspecting and analyzing mobile application storage files.☆49Updated 8 months ago
- ☆82Updated 7 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆183Updated 10 months ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆191Updated last week
- ☆124Updated 5 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆160Updated 5 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Updated last year
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆110Updated 7 months ago
- This repository serves as a curated resource for OffSec's OSEP (PEN-300) certification preparation, containing useful links, materials, a…☆65Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆218Updated 4 months ago
- ☆57Updated 4 months ago
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆141Updated 3 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Updated 7 months ago