trickest / mkpath
Make URL path combinations using a wordlist
☆173Updated last year
Alternatives and similar repositories for mkpath:
Users that are interested in mkpath are comparing it to the libraries listed below
- Generate tens of thousands of subdomain combinations in a matter of seconds☆260Updated last year
- ☆155Updated last year
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆104Updated 3 years ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆239Updated last year
- All Type of Payloads☆132Updated 11 months ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆181Updated 2 years ago
- A path-normalization pentesting tool.☆122Updated last year
- ☆235Updated 3 years ago
- Filter and enrich a list of subdomains by level☆199Updated last year
- CVE Collection of jQuery UI XSS Payloads☆118Updated 2 years ago
- Nuclei Templates - Here you will find the templates I use while hunting☆116Updated 3 years ago
- De-clutter a list of URLs☆326Updated 3 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆381Updated last year
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆59Updated 2 years ago
- Never forget where you inject.☆229Updated 2 years ago
- Real world bug bounty wordlists☆111Updated last year
- Burpsuite plugin for Interact.sh☆213Updated 8 months ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆280Updated last year
- Enumerate Subdomains Through Google Dorks☆123Updated 3 years ago
- BChecks collection for Burp Suite Professional☆93Updated 8 months ago
- Go script for bypassing 403 forbidden☆149Updated 3 years ago
- ☆151Updated last year
- Directory scans☆80Updated last year
- Check AWS S3 instances for read/write/delete access☆120Updated 3 years ago
- Describe how to use ffuf different options with examples☆84Updated 2 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆126Updated 2 years ago
- A collection oneliner scripts for bug bounty☆173Updated 11 months ago
- Jeeves SQLI Finder☆217Updated 2 years ago
- Finding XSS during recon☆255Updated 2 years ago
- ☆69Updated 2 years ago