yukselberkay / asnapLinks
asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the user to automate initial port and service scanning.
☆26Updated 4 years ago
Alternatives and similar repositories for asnap
Users that are interested in asnap are comparing it to the libraries listed below
Sorting:
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 4 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- ☆36Updated 7 months ago
- Default plugins for Jaeles Scanner☆35Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated last year
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- ☆47Updated 4 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- This script helps to identify CVE-2021-26855 ssrf Poc☆23Updated 4 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- RAS(RAndom Subdomain) Fuzzer☆42Updated 5 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Updated 5 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆17Updated 5 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Updated 6 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆33Updated 4 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- All-in-One WP Migration-Backup-Finder☆14Updated 3 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 4 years ago
- Advanced Recon Tool☆26Updated 5 years ago
- A tools for JavaScript Recon☆24Updated 5 years ago
- Custom scripts for directory fuzzing, subdomain enumeration, and more.☆43Updated 3 years ago
- Hacking Artifactory with server side template injection☆51Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆41Updated 4 years ago