toufik-airane / leakin
Secrets detection based on regular expressions.
☆23Updated last year
Alternatives and similar repositories for leakin:
Users that are interested in leakin are comparing it to the libraries listed below
- A tools for JavaScript Recon☆21Updated 4 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 4 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆15Updated 3 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- View screenshots as a slideshow over http☆15Updated 4 years ago
- Updated 4 years ago
- Jast (Just Another Screenshot Tool)☆9Updated 5 years ago
- A better dns bruteforcer written in golang☆13Updated 6 years ago
- ☆12Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Creating a Database for Mass Recon☆12Updated 3 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆10Updated 3 years ago
- parse ffuf & map endpoints to wordlists☆20Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- Wordlists for Bug Bounty☆25Updated 5 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆14Updated 4 years ago
- Tool for checking reflecting Parameters in a URL.☆10Updated 4 years ago
- It contain google dork to find the wsdl file.☆13Updated 4 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Updated 4 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆10Updated last year
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Tool to find stored robots.txt files from the past☆18Updated last year
- Everything about xss protection technology☆15Updated 5 years ago
- List of nearly 7 lakhs subdomains in scope probed using httpx to feed to nuclei☆8Updated 4 years ago
- ☆34Updated 3 weeks ago
- Easy discovery of assets☆13Updated 2 years ago
- ☆12Updated 4 years ago