BishopFox / xsshunter
The XSS Hunter service - a portable version of XSSHunter.com
☆26Updated 7 years ago
Alternatives and similar repositories for xsshunter:
Users that are interested in xsshunter are comparing it to the libraries listed below
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Common Findings Database☆100Updated 5 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 10 months ago
- ☆57Updated 4 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- ☆51Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Automatically performs the SMB relay attack☆72Updated 8 years ago
- ☆61Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- The initial conversation slides and menu of scenarios☆38Updated 3 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Automated enumeration☆30Updated 4 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- pwk notes and scripts☆15Updated 10 years ago
- Easy 802.1Q VLAN Hopping☆80Updated 9 months ago
- ☆12Updated 7 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Examine HTTP response headers for common security issues☆39Updated 2 years ago
- ☆26Updated 8 years ago
- ☆25Updated 8 years ago