4m3rr0r / zero-setupLinks
Zero Setup is a Bash script that automates the installation process of all the personal tools and software you need on your system. It saves you time and effort by setting up your Hacking environment with just a single command.
☆11Updated 2 years ago
Alternatives and similar repositories for zero-setup
Users that are interested in zero-setup are comparing it to the libraries listed below
Sorting:
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆256Updated last year
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆50Updated 8 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆157Updated last year
- Tool for automate bug hunting process 🔍 --> 🍭☆46Updated 6 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 8 months ago
- Google dorking tool☆238Updated 3 months ago
- Here are the most interesting Shodan dorks (according to me)☆97Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆77Updated last year
- SQL Injection Vulnerability Scanner made with Python☆379Updated 9 months ago
- Shodan Dorks☆471Updated 10 months ago
- Omnisci3nt – See What They’ve Tried to Hide Extract deep intelligence from any domain. From subdomains to SSL certs, archived secrets to …☆321Updated 4 months ago
- GoogleDorks Toolkit is a powerful automated tool for google dorks, designed for pentration tester, ethical hackers and bug hunters to det…☆56Updated 9 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆300Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆263Updated 5 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆227Updated 8 months ago
- Search & Parse Password Leaks☆412Updated last year
- Bypass 403☆164Updated 10 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆380Updated 2 years ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆164Updated 9 months ago
- Simple Google Dorks search tool☆308Updated 3 months ago
- A curated collection of tools, bots, and resources for Open Source Intelligence (OSINT) investigations on Telegram. Includes chat analysi…☆50Updated 2 months ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆161Updated last year
- ☆43Updated 8 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆224Updated 4 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆242Updated last year
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated last year
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆32Updated 8 months ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆198Updated 4 months ago