Dominique RIGHETTO

Results 40 issues of Dominique RIGHETTO

* https://portswigger.net/blog/new-burp-suite-api-we-want-your-feedback * https://github.com/PortSwigger/burp-extensions-montoya-api

enhancement

### Template / PR Information Hi, This PR propose a template to detect instance of the login panel for the **Rocket.Chat** software. - References: https://www.rocket.chat/ ### Template Validation I've validated...

### Template / PR Information Hi, This PR propose a template to detect instance of the software **Pexip**. - References: https://www.pexip.com/ ### Template Validation I've validated this template locally? -...

### Template / PR Information Hi, This PR propose a template to detect instance of the login panel for the **Kopano WebApp** software. - References: https://kopano.com/ ### Template Validation I've...

### Template / PR Information Hi, This PR propose a template to detect instance of the login panel for the **Opinio** software. - References: https://www.objectplanet.com/opinio/ ### Template Validation I've validated...

Status: On Hold

📋 Tasks: - [ ] Gather interesting commands. - [ ] Create a script, named **identify-azure-creds-capabilities**, like [this script](https://github.com/righettod/toolbox-pentest-web/blob/master/scripts/identify-aws-accesskey-capabilities.sh) done for AWS, that run different commands to identify the collection...

idea

🌏 https://github.com/corkami/mitra

idea

Hi, This PR add the endpoint exposed when the target supports DNS over HTTP requests. 📖My sources were the following ones: * https://developers.cloudflare.com/1.1.1.1/encryption/dns-over-https/make-api-requests/ * https://github.com/projectdiscovery/nuclei-templates/blob/main/http/miscellaneous/detect-dns-over-https.yaml 👀If the target supports DNS...

# Sites - [x] https://www.searchftps.net/ - [x] https://search.0t.rocks/ - [ ] https://www.onyphe.io/pricing#individual - [ ] https://builtwith.com/ - [ ] https://exposed.lol/ - [ ] https://www.postman.com/explore like for github

enhancement

Hi, It is normal that I do not found the field **Vulnerability Mapping** in the JSON returned? 👀 View from the web: ![image](https://github.com/OWASP/cwe-tool/assets/1573775/35fdbc3c-c48d-4820-8431-da2f47a848ef) 👀 View from the JSON: ![image](https://github.com/OWASP/cwe-tool/assets/1573775/0110bf3b-04c5-4c36-a345-70bcce48df54) 📖...