get the http allowed methods for URLs list
☆13Feb 22, 2021Updated 5 years ago
Alternatives and similar repositories for allowed-methods
Users that are interested in allowed-methods are comparing it to the libraries listed below
Sorting:
- automate the procedure of 403 response code bypass☆49Aug 2, 2021Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.☆11Dec 14, 2025Updated 2 months ago
- ☆12Jun 16, 2021Updated 4 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 4 years ago
- Tool to extract all subdomains from crt.sh search using RegEx and Web Scraping☆21Jan 5, 2024Updated 2 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- ☆17May 20, 2021Updated 4 years ago
- A tool for testing subdomain takeover possibilities at a mass scale.☆50May 23, 2021Updated 4 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 4 years ago
- Simple script to get your private/public or both programs using the Hackerone graphql.☆22Jan 24, 2020Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- unicode abnormalizer to takes a unicode string and abnormalizes it by character replacment☆26Jun 27, 2020Updated 5 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 7 years ago
- Tool to search possible emails indexed throught API's Hunter.io (https://hunter.io)☆31May 22, 2023Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- ☆13May 3, 2024Updated last year
- A JetBrains IDE plugin that integrates OpenCode — the open-source AI coding agent — directly into your development workflow.☆23Feb 8, 2026Updated 2 weeks ago
- For accessing info of both public and private instagram accounts☆17Aug 29, 2022Updated 3 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- ☆14Apr 29, 2021Updated 4 years ago
- Find the zone of the mobile number using the suffix code☆14Aug 17, 2022Updated 3 years ago
- this roadmap is a way to become UI UX designer in 2023 created by Menna Elgyar☆10Sep 9, 2023Updated 2 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Mar 7, 2021Updated 4 years ago
- Find orphaned IP's on cloud services☆29Oct 23, 2019Updated 6 years ago
- Tests for SSRF by injecting a specified location into different headers. This is a Rust port of m4ll0k's tool.☆37Jul 7, 2020Updated 5 years ago
- XSHOCK Shellshock Exploit☆90Dec 8, 2022Updated 3 years ago
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- ☆12Jul 13, 2020Updated 5 years ago
- Firefox and Chrome compatible extension that acts as annotation tool for websites (Named Entity Recognition)☆10Feb 17, 2019Updated 7 years ago
- d_5tr☆10Aug 26, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago