trap-bytes / hauditorLinks
hauditor is a tool designed to analyze the security headers returned by a web page.
☆172Updated 10 months ago
Alternatives and similar repositories for hauditor
Users that are interested in hauditor are comparing it to the libraries listed below
Sorting:
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 5 months ago
- Search for sensitive data in Postman public library.☆205Updated 5 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 6 months ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆175Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆122Updated 4 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆229Updated 10 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆133Updated last month
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆252Updated 3 weeks ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year
- A fast network scanning tool to detect open ports and security vulnerabilities☆113Updated last month
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆188Updated 2 weeks ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆223Updated 3 weeks ago
- A streamlined tool for discovering private TLDs for security research.☆207Updated this week
- Nuclei templates for honeypots detection.☆194Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆128Updated 2 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆349Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆91Updated last year
- Automated Subdomain Enumeration and Scanning Tool☆114Updated last year
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆228Updated last year
- CLI tool for fetching URLs from Wayback Machine, Common Crawl, and VirusTotal.☆36Updated 6 months ago
- CLI tool to scan URLs for suspicious keywords, extensions, paths, and hidden files.☆45Updated last week
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆99Updated 2 weeks ago
- Self-hosted passive subdomain continous monitoring tool.☆163Updated last year
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 5 months ago
- AI-powered ffuf wrapper☆492Updated 6 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆77Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆115Updated 5 months ago
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆55Updated last year
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆291Updated last year
- ☆119Updated last year