trufflesecurity / Trufflehog-Chrome-ExtensionView external linksLinks
☆418Oct 16, 2021Updated 4 years ago
Alternatives and similar repositories for Trufflehog-Chrome-Extension
Users that are interested in Trufflehog-Chrome-Extension are comparing it to the libraries listed below
Sorting:
- Gotator is a tool to generate DNS wordlists through permutations.☆503Jul 17, 2022Updated 3 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- ☆299Jul 16, 2022Updated 3 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,145Jan 21, 2026Updated 3 weeks ago
- Making Favicon.ico based Recon Great again !☆1,261Aug 29, 2023Updated 2 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Jun 23, 2024Updated last year
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,106Nov 18, 2024Updated last year
- ⚡Chrome extension allows you to create lists of Google and Github dork to open multiple tabs with one click, import "scope/out of scope" …☆137Dec 1, 2023Updated 2 years ago
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,397Sep 13, 2024Updated last year
- Go scripts for checking API key / access token validity☆220Aug 3, 2021Updated 4 years ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,038Aug 23, 2025Updated 5 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,042Aug 14, 2024Updated last year
- Private key usage verification☆432Apr 4, 2025Updated 10 months ago
- a javascript change monitoring tool for bugbounties☆710Jul 31, 2024Updated last year
- ☆1,118Updated this week
- Contextual Content Discovery Tool☆3,085Apr 29, 2024Updated last year
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,285Jan 26, 2024Updated 2 years ago
- Fetches javascript file from a list of URLS or subdomains.☆834Jul 22, 2025Updated 6 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,287Aug 7, 2025Updated 6 months ago
- Automation for javascript recon in bug bounty.☆1,067Sep 9, 2023Updated 2 years ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆519Jun 22, 2022Updated 3 years ago
- declutters url lists for crawling/pentesting☆1,522Feb 23, 2025Updated 11 months ago
- Client Side Prototype Pollution Scanner☆524Sep 17, 2022Updated 3 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆778May 10, 2022Updated 3 years ago
- Hidden parameters discovery suite☆2,015Sep 8, 2024Updated last year
- ☆20Sep 6, 2023Updated 2 years ago
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,262Jan 28, 2026Updated 2 weeks ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆775Aug 19, 2024Updated last year
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,495Jan 8, 2026Updated last month
- Get related domains / subdomains by looking at Google Analytics IDs☆251Jun 3, 2022Updated 3 years ago
- Full Nuclei automation script with logic explanation.☆246Mar 26, 2022Updated 3 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆966Jan 10, 2025Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,755May 22, 2024Updated last year
- Subdomain Takeover tool written in Go☆2,026Aug 13, 2023Updated 2 years ago
- Automated & Manual Wordlists provided by Assetnote☆1,602Jan 27, 2026Updated 2 weeks ago
- Salesforce object access auditor☆118Jan 30, 2023Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Jan 9, 2024Updated 2 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,021Jun 24, 2024Updated last year
- ☆561Mar 27, 2025Updated 10 months ago