trickest / trickest-cli
Execute Trickest workflows right from your terminal
☆85Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for trickest-cli
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆121Updated 4 months ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆50Updated 3 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆78Updated last year
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆178Updated 2 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆111Updated last year
- ☆86Updated 3 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆70Updated 7 months ago
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆102Updated 2 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 2 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆114Updated last year
- Identify virtual hosts by similarity comparison☆116Updated 3 months ago
- List all public repositories for (valid) GitHub usernames☆68Updated last year
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆128Updated 2 months ago
- ☆65Updated last year
- Mine URLs from Browser's Heap Snapshot for fun and profit☆63Updated last year
- Enumerate Subdomains Through Google Dorks☆122Updated 3 years ago
- IIS shortname scanner + bruteforce☆49Updated 9 months ago
- Check AWS S3 instances for read/write/delete access☆121Updated 2 years ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆53Updated 3 weeks ago
- HTTP parameter discovery suite.☆60Updated 4 years ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆117Updated 2 weeks ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆35Updated last year
- goverview - Get an overview of the list of URLs☆144Updated last year
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆86Updated 9 months ago
- BChecks collection for Burp Suite Professional☆83Updated 5 months ago
- ☆89Updated 3 years ago