a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves
☆66Sep 19, 2019Updated 6 years ago
Alternatives and similar repositories for lazyGrandma
Users that are interested in lazyGrandma are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- ☆11May 15, 2020Updated 5 years ago
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Mar 25, 2021Updated 5 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phis…☆16Jan 18, 2026Updated 2 months ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- ☆12Apr 14, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- SendToXray - Burp Suite Extender, Send HTTP request to XRAY proxy.☆11May 22, 2021Updated 4 years ago
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Python tool to automate some dorking stuff to find information disclosures.☆155Jul 3, 2024Updated last year
- ☆46Mar 20, 2021Updated 5 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- Beagle is a CLI written in Go to search for an specific username across the Internet.☆32Sep 15, 2020Updated 5 years ago
- Remote command shell application written in C# targeting the .NET runtime.☆29Mar 8, 2026Updated 2 weeks ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆47Dec 19, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Sep 11, 2021Updated 4 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- Hackable website for teaching/training purposes. Includes my undergraduate thesis.☆14Mar 7, 2018Updated 8 years ago
- Leakix Searcher☆14Apr 30, 2021Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Jul 31, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆59Dec 31, 2022Updated 3 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Jan 23, 2021Updated 5 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago