tehryanx / sourcemapper
Reconstruct javascript from a sourcemap in bash
☆38Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for sourcemapper
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 3 years ago
- View screenshots as a slideshow over http☆15Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 2 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆13Updated last year
- Web based favicon recon tool made using streamlit.☆9Updated 2 years ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆12Updated 4 years ago
- multiple password 'asher using Python’s hashlib☆14Updated 3 years ago
- A Go scraper that validates security.txt files and outputs them in the disclose.io JSON format.☆20Updated 3 years ago
- CVE-2020-5902☆9Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆50Updated 3 years ago
- Burp extension to increment a parameter in each active scan request☆11Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 4 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 2 years ago
- Related subdomains finder☆29Updated 2 years ago
- Easy discovery of assets☆12Updated 2 years ago
- Ffuf output browser☆37Updated last year
- Reconness Agents Script☆32Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago
- Validate proxies for specific domain☆34Updated 3 years ago
- Creating a Database for Mass Recon☆12Updated 3 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆11Updated 3 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- A command-line application to generate random user agent strings.☆17Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 3 years ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- HTTP requests of FrontPage expolit☆24Updated 10 years ago