1N3 / Findsploit
Find exploits in local and online databases instantly
☆1,707Updated 3 years ago
Alternatives and similar repositories for Findsploit:
Users that are interested in Findsploit are comparing it to the libraries listed below
- Reconnaissance Swiss Army Knife☆1,877Updated 4 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,698Updated 5 months ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,588Updated 3 months ago
- Striker is an offensive information and vulnerability scanner.☆2,258Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,714Updated last month
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,495Updated last year
- Advanced dork Search & Mass Exploit Scanner☆1,459Updated 7 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,179Updated this week
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,400Updated 6 years ago
- Advanced reconnaissance utility☆969Updated last year
- Automatically brute force all services running on a target.☆2,054Updated 7 months ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆619Updated last month
- Email recon made fast and easy, with a framework to build on☆953Updated 2 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,629Updated 4 months ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,308Updated 10 months ago
- MSFvenom Payload Creator (MSFPC)☆1,249Updated 3 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,181Updated 7 years ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆894Updated last year
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆629Updated 2 years ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆722Updated last year
- wide range mass audit toolkit☆999Updated 6 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,540Updated this week
- Know the dangers of credential reuse attacks.☆2,047Updated 5 months ago
- Image Payload Creating/Injecting tools☆1,226Updated last year
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,088Updated 4 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,350Updated 4 years ago
- The New Hacking Framework☆698Updated 3 years ago
- A default credential scanner.☆1,474Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆775Updated 10 months ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,142Updated 5 years ago