trickest / mkpathLinks
Make URL path combinations using a wordlist
☆173Updated last year
Alternatives and similar repositories for mkpath
Users that are interested in mkpath are comparing it to the libraries listed below
Sorting:
- Generate tens of thousands of subdomain combinations in a matter of seconds☆271Updated last year
- ☆162Updated 2 years ago
- Jeeves SQLI Finder☆218Updated 3 years ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆245Updated 5 months ago
- A path-normalization pentesting tool.☆129Updated last year
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆108Updated 3 years ago
- ☆248Updated 4 years ago
- Real world bug bounty wordlists☆117Updated 2 years ago
- ☆136Updated 9 months ago
- Useful "Match and Replace" burpsuite rules☆349Updated last year
- All Type of Payloads☆136Updated last year
- BChecks collection for Burp Suite Professional☆100Updated last year
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆62Updated 2 years ago
- Never forget where you inject.☆261Updated last week
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆181Updated 3 years ago
- Filter and enrich a list of subdomains by level☆209Updated last year
- Go script for bypassing 403 forbidden☆155Updated 4 years ago
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆101Updated 5 months ago
- ☆157Updated 3 years ago
- A collection oneliner scripts for bug bounty☆179Updated last year
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆130Updated 3 years ago
- Identify virtual hosts by similarity comparison☆129Updated last year
- Opensource assets and vulnerability scanning tool☆182Updated 2 months ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆144Updated last year
- Describe how to use ffuf different options with examples☆87Updated 2 years ago
- ☆115Updated 2 years ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆294Updated last year
- Check AWS S3 instances for read/write/delete access☆121Updated 3 years ago
- ☆156Updated 2 years ago
- Enumerate Subdomains Through Google Dorks (Bypassed Page Filter)☆125Updated last month