trap-bytes / hauditorLinks
hauditor is a tool designed to analyze the security headers returned by a web page.
☆176Updated last year
Alternatives and similar repositories for hauditor
Users that are interested in hauditor are comparing it to the libraries listed below
Sorting:
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆236Updated last year
- Search for sensitive data in Postman public library.☆213Updated last month
- The Most Advanced Client-Side Prototype Pollution Scanner☆239Updated last week
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆178Updated last year
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 9 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆151Updated last week
- Nuclei templates for honeypots detection.☆196Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆260Updated 3 months ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆131Updated 9 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆79Updated last year
- An uber fast and simple subdomain enumeration tool using DNS and web requests with support for detecting wildcard DNS records.☆176Updated last year
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆239Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆130Updated 8 months ago
- Here are some cool and some unpublished Dorks☆79Updated 8 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆215Updated 8 months ago
- ☆190Updated 5 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆226Updated 2 weeks ago
- AI/LLM local model integration for analysis of reconftw results☆83Updated 5 months ago
- Automated Subdomain Enumeration and Scanning Tool☆116Updated 2 years ago
- Search for all leaked keys/secrets using one regex! bugbounty☆139Updated 6 months ago
- **SubHunterX** is an automated tool for subdomain enumeration, vulnerability scanning, and exploitation. It discovers subdomains, detects…☆31Updated 5 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆207Updated last month
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆156Updated last month
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆150Updated last year
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆124Updated 3 weeks ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 9 months ago
- Discovering Typo Squatting on your domains!☆73Updated last year
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆147Updated last month