☆419Oct 16, 2021Updated 4 years ago
Alternatives and similar repositories for Trufflehog-Chrome-Extension
Users that are interested in Trufflehog-Chrome-Extension are comparing it to the libraries listed below
Sorting:
- Gotator is a tool to generate DNS wordlists through permutations.☆507Jul 17, 2022Updated 3 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- ☆299Jul 16, 2022Updated 3 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,153Jan 21, 2026Updated last month
- Making Favicon.ico based Recon Great again !☆1,268Aug 29, 2023Updated 2 years ago
- A simple tool which makes creating nuclei templates even easier.☆37Jun 23, 2024Updated last year
- ⚡Chrome extension allows you to create lists of Google and Github dork to open multiple tabs with one click, import "scope/out of scope" …☆137Dec 1, 2023Updated 2 years ago
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,401Sep 13, 2024Updated last year
- Go scripts for checking API key / access token validity☆221Aug 3, 2021Updated 4 years ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,039Aug 23, 2025Updated 6 months ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,131Feb 23, 2026Updated 2 weeks ago
- Private key usage verification☆431Apr 4, 2025Updated 11 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,089Aug 14, 2024Updated last year
- a javascript change monitoring tool for bugbounties☆712Jul 31, 2024Updated last year
- ☆1,128Feb 12, 2026Updated 3 weeks ago
- Contextual Content Discovery Tool☆3,106Apr 29, 2024Updated last year
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,293Jan 26, 2024Updated 2 years ago
- Fetches javascript file from a list of URLS or subdomains.☆837Jul 22, 2025Updated 7 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,293Aug 7, 2025Updated 7 months ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆519Jun 22, 2022Updated 3 years ago
- Client Side Prototype Pollution Scanner☆522Sep 17, 2022Updated 3 years ago
- Automation for javascript recon in bug bounty.☆1,069Sep 9, 2023Updated 2 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆782May 10, 2022Updated 3 years ago
- declutters url lists for crawling/pentesting☆1,532Feb 23, 2025Updated last year
- ☆20Sep 6, 2023Updated 2 years ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆778Aug 19, 2024Updated last year
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,313Updated this week
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,500Jan 8, 2026Updated 2 months ago
- Hidden parameters discovery suite☆2,028Sep 8, 2024Updated last year
- Get related domains / subdomains by looking at Google Analytics IDs☆250Jun 3, 2022Updated 3 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆967Jan 10, 2025Updated last year
- Salesforce object access auditor☆117Jan 30, 2023Updated 3 years ago
- Subdomain Takeover tool written in Go☆2,033Aug 13, 2023Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,773May 22, 2024Updated last year
- Let's check if your target is vulnerable for client side prototype pollution.☆65Jan 9, 2024Updated 2 years ago
- Automated & Manual Wordlists provided by Assetnote☆1,637Feb 27, 2026Updated last week
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,024Feb 22, 2026Updated 2 weeks ago
- ☆562Mar 27, 2025Updated 11 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆641Jul 7, 2025Updated 8 months ago