|
43 | 43 | - [postMessage](#postMessage) |
44 | 44 | - [Subdomain Takeover](#Subdomain-Takeover) |
45 | 45 | - [Vulnerability Scanners](#Vulnerability-Scanners) |
| 46 | + - [Forbidden Bypass](#Forbidden-Bypass) |
46 | 47 | - [Permutation](#Permutation) |
47 | 48 | - [Useful](#Useful) |
48 | 49 | - [Uncategorized](#Uncategorized) |
|
470 | 471 | - [second-order](https://github.com/mhmdiaa/second-order) - Second-order subdomain takeover scanner |
471 | 472 | - [takeover](https://github.com/mzfr/takeover) - A tool for testing subdomain takeover possibilities at a mass scale. |
472 | 473 | - [dnsReaper](https://github.com/punk-security/dnsReaper) - DNS Reaper is yet another sub-domain takeover tool, but with an emphasis on accuracy, speed and the number of signatures in our arsenal! |
| 474 | +- [subzy](https://github.com/PentestPad/subzy) - Subdomain takeover tool which works based on matching response fingerprints from `can-i-take-over-xyz`. |
473 | 475 |
|
474 | 476 | ### Vulnerability Scanners |
475 | 477 |
|
|
491 | 493 | - [OWASP ZAP](https://github.com/zaproxy/zaproxy) - World’s most popular free web security tools and is actively maintained by a dedicated international team of volunteers |
492 | 494 | - [SSTImap](https://github.com/vladko312/SSTImap) - SSTImap is a penetration testing software that can check websites for Code Injection and Server-Side Template Injection vulnerabilities and exploit them, giving access to the operating system itself. |
493 | 495 |
|
| 496 | +### Forbidden Bypass |
| 497 | + |
| 498 | +- [XFFenum](https://github.com/vavkamil/XFFenum) - A simple tool to bypass 403 forbidden end-points behind load balancers (Cloudflare) based on X-Forwarded-For header. |
| 499 | +- [NoMore403](https://github.com/devploit/nomore403) - Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. |
| 500 | +- [Forbidden Buster](https://github.com/Sn1r/Forbidden-Buster) - A tool designed to automate various techniques in order to bypass HTTP 401 and 403 response codes and gain access to unauthorized areas in the system. |
| 501 | + |
494 | 502 | ### Permutation |
495 | 503 |
|
496 | 504 | - [alterx](https://github.com/projectdiscovery/alterx) - Fast and customizable subdomain wordlist generator using DSL. alterx takes patterns as input and generates subdomain permutation wordlist based on that pattern. |
|
520 | 528 | - [android-security-awesome](https://github.com/ashishb/android-security-awesome) - A collection of android security related resources |
521 | 529 | - [awesome-mobile-security](https://github.com/vaib25vicky/awesome-mobile-security) - An effort to build a single place for all useful android and iOS security related stuff. |
522 | 530 | - [awesome-vulnerable-apps](https://github.com/vavkamil/awesome-vulnerable-apps) - Awesome Vulnerable Applications |
523 | | -- [XFFenum](https://github.com/vavkamil/XFFenum) - X-Forwarded-For [403 forbidden] enumeration |
524 | 531 | - [httpx](https://github.com/projectdiscovery/httpx) - httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. |
525 | 532 | - [csprecon](https://github.com/edoardottt/csprecon) - Discover new target domains using Content Security Policy |
| 533 | +- [SecLists](https://github.com/danielmiessler/SecLists) - It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. |
526 | 534 |
|
527 | 535 | --- |
528 | 536 |
|
|
0 commit comments