trickest / mkpath
Make URL path combinations using a wordlist
☆174Updated last year
Alternatives and similar repositories for mkpath:
Users that are interested in mkpath are comparing it to the libraries listed below
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆240Updated last year
- ☆148Updated last year
- A path-normalization pentesting tool.☆120Updated last year
- All Type of Payloads☆130Updated 10 months ago
- BChecks collection for Burp Suite Professional☆86Updated 7 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆381Updated last year
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆104Updated 2 years ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆137Updated 3 months ago
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆59Updated 2 years ago
- ☆236Updated 3 years ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆239Updated 2 weeks ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆130Updated 4 months ago
- ☆161Updated 2 months ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆180Updated 2 years ago
- Useful "Match and Replace" burpsuite rules☆340Updated last year
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆121Updated 6 months ago
- De-clutter a list of URLs☆318Updated 2 months ago
- Self-hosted passive subdomain continous monitoring tool.☆158Updated 11 months ago
- A collection oneliner scripts for bug bounty☆174Updated 10 months ago
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆96Updated 3 weeks ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆128Updated last month
- Nuclei Templates - Here you will find the templates I use while hunting☆117Updated 3 years ago
- Go script for bypassing 403 forbidden☆150Updated 3 years ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆132Updated 11 months ago
- unleashed ffuf☆109Updated 7 months ago
- ☆130Updated 2 months ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆258Updated last year
- ☆152Updated last year
- ☆154Updated 3 years ago
- ☆70Updated 2 years ago