ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API queries, and user detail endpoints to find usernames. Ideal for security assessments, this tool supports configurable timeouts and concurrency.
☆14Jan 17, 2025Updated last year
Alternatives and similar repositories for ICU-WP
Users that are interested in ICU-WP are comparing it to the libraries listed below
Sorting:
- ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.☆17Oct 17, 2024Updated last year
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Sep 25, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆29Oct 17, 2024Updated last year
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Nov 13, 2024Updated last year
- XSSGAI is the first-ever AI-powered XSS (Cross-Site Scripting) payload generator. It leverages machine learning and deep learning to crea…☆35Feb 4, 2026Updated last month
- DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incom…☆18Feb 25, 2026Updated last week
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆18Oct 19, 2024Updated last year
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities …☆15Jan 29, 2025Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Oct 17, 2024Updated last year
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Jul 24, 2025Updated 7 months ago
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆37Dec 3, 2024Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆82Apr 12, 2025Updated 10 months ago
- Modular Windows toolkit for Chrome history harvesting & red team demos.☆13Feb 19, 2026Updated 2 weeks ago
- Oty is a fast, customizable, CLI tool designed to streamline your Bug Bounty and Pentesting workflows. Powered by a simple yet flexible Y…☆28Jan 27, 2025Updated last year
- DataWhiz is a Python-based OSINT tool for retrieving Pakistani mobile and CNIC data. Built with both CLI and GUI interfaces, it was devel…☆19Nov 24, 2025Updated 3 months ago
- This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older ver…☆12Jan 31, 2025Updated last year
- bring shodan facets into your terminal without API key.☆96Oct 21, 2025Updated 4 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Oct 17, 2024Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆147Jan 12, 2025Updated last year
- ☆15Sep 21, 2019Updated 6 years ago
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆12Feb 11, 2026Updated 3 weeks ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆35Jan 18, 2026Updated last month
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆39Oct 23, 2023Updated 2 years ago
- ☆37Dec 3, 2024Updated last year
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Sep 22, 2023Updated 2 years ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆42Jan 29, 2025Updated last year
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 4 months ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆10Jul 11, 2024Updated last year
- DigiNode Tools - Setup, monitor and manage a DigiByte Node and DigiAssets Node on a Raspberry Pi or Ubuntu/Debian system.☆10Apr 30, 2025Updated 10 months ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- simple tool for finding javascript files from webapps☆10Apr 20, 2023Updated 2 years ago
- Clickme is a powerful multi-step clickjacking tool designed for security professionals. Create, visualize, and demonstrate complex clickj…☆14Sep 4, 2025Updated 6 months ago
- Python script that types out the text that exists in clipboard.☆12Mar 31, 2025Updated 11 months ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆11May 19, 2020Updated 5 years ago
- ☆11Nov 18, 2025Updated 3 months ago
- Restoring some of my older tools to the web☆12Oct 18, 2024Updated last year
- Quick and dirty script to parse bplists with Ruby☆13Oct 29, 2020Updated 5 years ago