skavans / universal-proxy-pac
The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generated automatically.
☆9Updated 4 years ago
Related projects: ⓘ
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- ☆10Updated this week
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 3 years ago
- Magento Security Scanner☆15Updated 2 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 4 months ago
- List of domains having RVDP programmes☆10Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆15Updated 4 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆19Updated 3 years ago
- Web based favicon recon tool made using streamlit.☆10Updated 2 years ago
- Everything about xss protection technology☆15Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 3 years ago
- ☆13Updated 5 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Updated 4 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆15Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 5 years ago
- A tools for JavaScript Recon☆20Updated 4 years ago
- Automate Recon process using Shell Scripting☆11Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆18Updated 7 years ago
- It contain google dork to find the wsdl file.☆13Updated 4 years ago
- ☆18Updated this week
- Creating a Database for Mass Recon☆12Updated 3 years ago
- Simple tools to handle string and generate subdomain permutations☆13Updated 2 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆9Updated 3 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆17Updated 3 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 5 months ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 3 years ago
- Python support package to parse IP and host inputs from network based tooling☆10Updated 11 months ago