trufflesecurity / Trufflehog-Chrome-ExtensionLinks
☆419Updated 4 years ago
Alternatives and similar repositories for Trufflehog-Chrome-Extension
Users that are interested in Trufflehog-Chrome-Extension are comparing it to the libraries listed below
Sorting:
- Golang client for querying SecurityTrails API data☆578Updated last week
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆348Updated 4 years ago
- Scrapts Scrapts Scrapts☆239Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆327Updated 6 months ago
- A DNS Bruteforcing Wordlist Generator☆362Updated 2 years ago
- Automated learning of regexes for DNS discovery☆387Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆270Updated 2 years ago
- A Security Tool for Enumerating WebSockets☆363Updated 4 years ago
- A Firefox Web Extension to improve the discovery of DOM XSS.☆286Updated last year
- GraphQL automated security testing toolkit☆332Updated last year
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆320Updated last week
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆642Updated 6 months ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆234Updated 3 years ago
- Subdomain finder☆372Updated last year
- CrackQL is a GraphQL password brute-force and fuzzing utility.☆343Updated last year
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology …☆796Updated 7 months ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆301Updated 2 years ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆404Updated 4 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,010Updated last year
- ☆432Updated 4 years ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆453Updated 3 years ago
- ☆533Updated 2 months ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆345Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆503Updated 3 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆971Updated 2 years ago
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆270Updated 4 months ago
- Discover new target domains using Content Security Policy☆499Updated last week
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆283Updated last year
- Rust-based high performance domain permutation generator.☆296Updated 2 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆218Updated 5 years ago