v1ll41n / H1-Report-Finder
A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host
☆42Updated 4 years ago
Alternatives and similar repositories for H1-Report-Finder:
Users that are interested in H1-Report-Finder are comparing it to the libraries listed below
- ☆22Updated 3 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- A solid recon tool I use personally.☆30Updated last year
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- AWS S3 open bucket poc automated script.☆57Updated 3 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆58Updated 3 years ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Updated last year
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- Tool for making it easy to collect dns results from the CLI☆40Updated 8 months ago
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆48Updated 2 years ago
- ☆56Updated 11 months ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago
- Information Security Information From Web☆27Updated 7 months ago
- IIS shortname scanner + bruteforce☆52Updated last year
- ☆65Updated 2 years ago
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- The project aims at creating target-specific wordlists for any web application that you are testing.☆65Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- Script for Bug Bounty☆28Updated 3 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 4 years ago
- ☆18Updated 2 years ago
- Misc bounty and vulndisc things☆84Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Enhanced 403 bypass header☆21Updated 2 years ago
- ☆27Updated 5 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆122Updated 2 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 6 years ago
- s3 brute force tool☆44Updated 3 years ago