trickest / elasticsearch_indexLinks
Manage attack surface data on Elasticsearch
☆22Updated last year
Alternatives and similar repositories for elasticsearch_index
Users that are interested in elasticsearch_index are comparing it to the libraries listed below
Sorting:
- ☆27Updated 2 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- Ffuf output browser☆39Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated last year
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- Tool for fetching all the available waybackmachine snapshot urls☆22Updated 9 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Advanced test for proxy & waf☆13Updated 10 months ago
- Demo of various ways to exploit post based reflected XSS☆18Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- A command-line utility for auditing DNS configuration using Zonemaster API☆30Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 11 months ago
- Python script to launch burp scans automatically☆32Updated 4 years ago
- ☆19Updated last year
- Template Nuclei SSTI☆31Updated last year
- Looks for parameters in urls☆34Updated 9 months ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago