un4gi / dirtywords
A targeted word list generation tool
☆76Updated 2 years ago
Related projects: ⓘ
- Dump all available paths and/or endpoints on WADL file.☆87Updated this week
- ☆64Updated last year
- Tool for making it easy to collect dns results from the CLI☆39Updated last month
- ☆33Updated this week
- It's an watcher for new scopes added to bounty-targets-data and send you alert to Slack.☆54Updated 2 years ago
- A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!☆84Updated 4 years ago
- IIS shortname scanner + bruteforce☆46Updated 7 months ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆53Updated 2 years ago
- ☆99Updated this week
- Extract JavaScript files from burp suite project with ease.☆76Updated 2 years ago
- sub domain wild card filtering tool☆41Updated 4 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆58Updated 3 years ago
- Send notifications on different channels such as Slack, Telegram, Discord etc.☆39Updated last year
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆54Updated last year
- The project aims at creating target-specific wordlists for any web application that you are testing.☆62Updated 2 years ago
- ☆39Updated 2 years ago
- Striping CDN IPs from a list of IP Addresses☆72Updated 2 years ago
- A Tool to find subdomains from hackerone reports.☆16Updated 3 years ago
- Basic implementation of certstream to print new subdomains and domains☆37Updated 3 years ago
- A collection of scripts for bug-bounty related stuff☆36Updated 4 years ago
- Find subdomains and takeovers.☆81Updated last year
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆130Updated 3 years ago
- Detects request smuggling via HTTP/2 downgrades.☆92Updated 2 years ago
- Takeover AWS ips and have a working POC for Subdomain Takeover.☆88Updated 5 months ago
- Obtain GraphQL API schema despite disabled introspection!☆50Updated 3 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆65Updated 3 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 2 years ago
- ☆56Updated 2 months ago
- Script to test open Akamai ARL vulnerability.☆70Updated 3 years ago
- Searching for virtual hosts among non-resolvable domains☆86Updated 4 years ago