siratsami / crsbfLinks
Brute Force subdomains with a list of custom DNS records.
☆13Updated 2 years ago
Alternatives and similar repositories for crsbf
Users that are interested in crsbf are comparing it to the libraries listed below
Sorting:
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- IIS shortname scanner + bruteforce☆54Updated last year
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Updated 3 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆19Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Updated 4 years ago
- ☆37Updated last year
- A solid recon tool I use personally.☆30Updated 2 years ago
- Alternative to XSS Hunter for blind XSS.☆51Updated 2 years ago
- Tool for testing reflections in the HTTP responses☆60Updated 2 years ago
- A browser bookmark to show hidden fields and enable disabled fields on a web page☆20Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 10 months ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆48Updated 3 years ago
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Updated 2 years ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆42Updated 2 years ago
- Process URLs and remove duplicate query parameters.☆28Updated last year
- A Burp Extension that makes it easier to view all script code on a Response.☆16Updated 2 years ago
- Enhanced 403 bypass header☆21Updated 3 years ago
- A simple plugin to export JS files from one or multiple targets☆43Updated 2 years ago
- ☆21Updated 2 years ago
- This repository contains proof of concept for zero days and CVEs that were found by Omar Hashem through Security Research☆45Updated 2 years ago
- Some of the gf patterns which i use☆45Updated 3 years ago
- Web cache poisoning vulnerability scanner.☆72Updated 3 years ago
- In this repo, I have created a subdomain enumeration function that grab subdomains in deep.☆22Updated 2 years ago
- Script that download 37+ open source nuclei templates☆44Updated 3 years ago
- Find secret keys from JS file☆52Updated 2 years ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆38Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- ☆67Updated 2 years ago
- ☆18Updated 4 months ago
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆93Updated 4 years ago