1N3 / AttackSurfaceManagementLinks
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
☆99Updated 4 years ago
Alternatives and similar repositories for AttackSurfaceManagement
Users that are interested in AttackSurfaceManagement are comparing it to the libraries listed below
Sorting:
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Updated 3 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- ☆72Updated 2 years ago
- Spaghetti - Web Application Security Scanner☆21Updated 8 years ago
- Customized Password/Passphrase List inputting Target Info☆96Updated last year
- Small python script to look for common vulnerabilities on SMTP server.☆48Updated 2 years ago
- Dorks for Google, Shodan and BinaryEdge☆142Updated 5 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Updated 4 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 3 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- A WLAN red team framework.☆155Updated 2 weeks ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated last year
- Host Header Injection Scanner☆50Updated 5 years ago
- Yet another content discovery tool☆118Updated last year
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆66Updated 6 years ago
- Top password lists generated from leaks collected from different paste sites☆32Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 4 months ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Headless web crawler for bugbounty and penetration-testing/redteaming☆39Updated last year
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆50Updated 8 months ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 4 years ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 4 months ago
- It's a simple tool for test vulnerability shellshock☆119Updated 4 years ago