0xInfection / vulninfraLinks
For finding secrets, tokens and other common mistakes made by developers.
☆12Updated 2 months ago
Alternatives and similar repositories for vulninfra
Users that are interested in vulninfra are comparing it to the libraries listed below
Sorting:
- Automated Recon Framework☆24Updated 5 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- ☆13Updated 6 years ago
- A simple CLI tool to check WebDAV vulnerability☆14Updated 4 years ago
- A Complete SubDomain Enumeration Tool☆25Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 5 years ago
- Runs sshd as a unprivileged user for persistence☆12Updated 6 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 4 years ago
- Ragno is a Passive URL Crawler | Written in Python3 | Fetches URLs from the Wayback Machine, AlienVault's Open Threat Exchange & Common C…☆22Updated 4 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- ☆33Updated 11 months ago
- InfiniteWP Client < 1.9.4.5 - Authentication Bypass☆21Updated 4 years ago
- SSH brute-force script created for HackTheBox☆16Updated 5 years ago
- DNS hijacking via dead records automation tool☆53Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- Wordlist generator☆16Updated 5 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Open Redirect Vulnerability Payload List☆10Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- Shodan Port Scanner☆43Updated 5 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆17Updated 5 years ago
- Automating the SQL Injection through Google dorks.☆26Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Turn your VPS into an attack box☆34Updated last year
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Updated 6 years ago