0xSaikat / penstallerLinks
Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools for recon, fuzzing, and vulnerability scanning, saving time and keeping your system lightweight. Perfect for beginners and pros alike.
☆15Updated 6 months ago
Alternatives and similar repositories for penstaller
Users that are interested in penstaller are comparing it to the libraries listed below
Sorting:
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 10 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 2 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆54Updated 8 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 9 months ago
- ☆46Updated 6 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆39Updated 9 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆126Updated last year
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆204Updated last month
- ☆40Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆70Updated 5 months ago
- ☆35Updated 5 months ago
- Discovering Typo Squatting on your domains!☆71Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆174Updated 3 weeks ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆49Updated 3 months ago
- ☆27Updated last year
- Grep subdomains from web pages.☆44Updated 7 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆59Updated 5 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆124Updated 9 months ago
- CrlfiX☆20Updated 7 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆130Updated last week
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆48Updated last year
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆39Updated 7 months ago
- ☆94Updated 5 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated 11 months ago
- This repository contains the best fuzzing wordlist files☆34Updated 9 months ago
- An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open R…☆130Updated this week