udit-thakkur / AdvancedKeyHacks
API Key/Token Exploitation Made easy.
☆89Updated 3 years ago
Alternatives and similar repositories for AdvancedKeyHacks
Users that are interested in AdvancedKeyHacks are comparing it to the libraries listed below
Sorting:
- A tool for append URLs, skipping duplicates/paths & combine parameters.☆121Updated 3 years ago
- BurpSuite extension to inject custom cross-site scripting payloads on every form/request submitted to detect blind XSS vulnerabilities☆111Updated last year
- List HackerOne private program assets☆152Updated 3 years ago
- golang tool to scan domains or single domains with know security issues against xmlrpc☆62Updated last year
- Simple fork from degoogle original project with bug hunting purposes☆87Updated 2 years ago
- Find subdomains and takeovers.☆85Updated 2 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆132Updated 4 years ago
- Get the scope of your bugcrowd programs☆67Updated 4 years ago
- Finds the End-Points in JavaScript files☆92Updated 3 years ago
- Just some public notes that can be useful and i want let the world knows.☆87Updated 4 years ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆99Updated 3 years ago
- The scripts I write to help me on my bug bounty hunting☆121Updated 3 years ago
- X-Forwarded-For [403 forbidden] enumeration☆93Updated last year
- GitHub Recon — and what you can achieve with it!☆116Updated 4 years ago
- A list of Awesome Bughunting oneliners , collected from the various sources☆68Updated last year
- ☆59Updated 2 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Updated 3 years ago
- 📚 An ultimate collection wordlists of the best-known CMS☆89Updated 11 months ago
- Misc bounty and vulndisc things☆84Updated 4 years ago
- Takeover AWS ips and have a working POC for Subdomain Takeover.☆91Updated 2 months ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆159Updated last year
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆72Updated 3 years ago
- A simple Swagger-ui scanner that can detect old versions vulnerable to various XSS attacks☆59Updated 5 years ago
- A Burp Suite extension for CSRF proof of concepts.☆51Updated 2 years ago
- Signatures for jaeles scanner by @j3ssie☆116Updated last year
- All known and unknown public POC's for wordpress themes and plugins☆78Updated 3 years ago
- Some of my bug bounty tools☆51Updated 5 years ago
- ☆76Updated last year
- s3 brute force tool☆44Updated 4 years ago