yukselberkay / asnapLinks
asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the user to automate initial port and service scanning.
☆26Updated 4 years ago
Alternatives and similar repositories for asnap
Users that are interested in asnap are comparing it to the libraries listed below
Sorting:
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- ☆36Updated 10 months ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- RAS(RAndom Subdomain) Fuzzer☆42Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- XMLRPC - RCE in MovableTypePoC☆21Updated 3 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆33Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated last year
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 5 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Updated 6 years ago
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Updated 5 years ago
- Security test tool for Blind XSS☆26Updated 5 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Updated 2 years ago
- ⚡️ Multiple target ZAP Scanning☆105Updated 2 years ago
- ☆47Updated 4 years ago
- Advanced Recon Tool☆26Updated 5 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Magento Security Scanner☆15Updated 3 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 6 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 5 years ago
- Query various sources for CVE proof-of-concepts☆52Updated 2 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆86Updated 2 years ago