va1da5 / manual-source-code-reviewLinks
Regex patterns for manual application source code review
☆33Updated 4 years ago
Alternatives and similar repositories for manual-source-code-review
Users that are interested in manual-source-code-review are comparing it to the libraries listed below
Sorting:
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆80Updated 2 years ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Updated last year
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- Sample Obsidian's vault for web pentesting☆99Updated last year
- ☆22Updated 4 years ago
- ☆41Updated 4 months ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆42Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- ☆32Updated last year
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- Filter URLs to save your time.☆60Updated 3 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Updated 2 years ago
- Extract JavaScript files from burp suite project with ease.☆97Updated 3 years ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆58Updated last year
- This is a comprehensive Subdomain Enumeration Guide that traces back to my GitBook.☆31Updated 8 months ago
- ☆67Updated 2 years ago
- Port Swigger Labs divided on the based of level and topic.☆14Updated 3 years ago
- Guide to SSRF☆73Updated 2 years ago
- ☆57Updated last year
- vīlicus is a bug bounty api dashboard☆41Updated 2 years ago
- Wordlist for Hacking, Penetration Testing, Vulnerability Assessments and More☆65Updated last year
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆48Updated 3 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Updated 4 years ago
- Information Security Information From Web☆28Updated 3 months ago
- Template used for my OSCP exam.☆29Updated 3 years ago
- Alternative to XSS Hunter for blind XSS.☆51Updated 2 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Updated 3 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- IIS shortname scanner + bruteforce☆54Updated last year
- Checks if files is accessible based on the source code.☆16Updated last year