sleepyeinstein / lemma
Remote CLI tools at your fingertips
☆57Updated 6 months ago
Alternatives and similar repositories for lemma:
Users that are interested in lemma are comparing it to the libraries listed below
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆139Updated 4 months ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆131Updated 5 months ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆133Updated 11 months ago
- unleashed ffuf☆110Updated 7 months ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- ☆127Updated 3 years ago
- Custom scan profiles for use with Burp Suite Pro☆121Updated 10 months ago
- ☆40Updated last month
- ☆101Updated 6 months ago
- Gather results of dorks across a number of search engines☆97Updated 2 months ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆122Updated 7 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆118Updated 2 years ago
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆85Updated last year
- ☆162Updated this week
- ☆31Updated last year
- ☆65Updated 2 years ago
- ☆151Updated last year
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆140Updated last week
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆140Updated last year
- Finds graphql queries in javascript files☆57Updated 8 months ago
- ☆103Updated last year
- Recon-Ninja☆87Updated 10 months ago
- ☆152Updated last year
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆39Updated last year
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆90Updated last year
- ☆137Updated 9 months ago
- Identify virtual hosts by similarity comparison☆116Updated 6 months ago
- ☆158Updated 7 months ago
- A path-normalization pentesting tool.☆120Updated last year