Connect with potential users and investors, showcase your tool here!
Displays stats and graphs about your Bug Bounty activity.
Distribution for pentesting IoT devices.
Standalone MITM attack framework allowing for the bypass of 2-factor authentication.
Searches for publicly available files hosted on various websites for a particular domain.
The first ever CLI based menu-driven web application B-Tier recon framework.
Simple JWT token brute force cracker.
Identifies server-side prototype pollution vulnerabilities.
Prototype Pollution exploits collection.
Exploitation tool which leverages client-side Prototype Pollution to XSS.
Improved version of SayCheese, designed to capture images via social engineering.
Grab target's webcam shots by link.
A self-hosted WAF to protect web applications from cyber attacks.
Broken Link Hijacking Burp Suite extension.
A dead-simple way to recursively look for broken links on a web page.
Find broken links, missing images, etc within your HTML.