☆24Aug 9, 2022Updated 3 years ago
Alternatives and similar repositories for NSDetect
Users that are interested in NSDetect are comparing it to the libraries listed below
Sorting:
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- Toggle Burp proxy from anywhere and get its status in i3wm☆23Sep 2, 2024Updated last year
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- Dnslog Interactsh的Py版接口查询☆13Dec 10, 2021Updated 4 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 5 years ago
- Validate proxies for specific domain☆38Aug 14, 2021Updated 4 years ago
- A tool for identifying misconfigured CloudFront domains☆17Apr 27, 2018Updated 7 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- Utility to check the integrity of your DNS managed zones at your cloud service provider☆15Jan 19, 2022Updated 4 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆18Jan 29, 2026Updated last month
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- ☆102Oct 5, 2020Updated 5 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated last year
- ☆56Aug 26, 2021Updated 4 years ago
- Suricata RPMs for CentOS/RHEL and Fedora☆19Jan 13, 2026Updated last month
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Nov 19, 2020Updated 5 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 3 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 4 years ago
- 🔍 A simple tool to obtain long lists of ips from domains using goroutines☆26Jul 29, 2019Updated 6 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 4 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- A simple utility to generate domain names with all possible TLDs☆23Feb 3, 2023Updated 3 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 2 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 3 weeks ago
- CVE database☆21Sep 2, 2020Updated 5 years ago