A fast WordPress plugin enumeration tool
☆783Feb 17, 2026Updated 2 weeks ago
Alternatives and similar repositories for wpprobe
Users that are interested in wpprobe are comparing it to the libraries listed below
Sorting:
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆723Updated this week
- ☆772May 7, 2025Updated 9 months ago
- An IIS short filename enumeration tool☆1,126Nov 25, 2024Updated last year
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆311Mar 31, 2024Updated last year
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆383Nov 26, 2024Updated last year
- Header Exploitation HTTP☆711Feb 24, 2026Updated last week
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,426Jul 14, 2025Updated 7 months ago
- Discover new target domains using Content Security Policy☆505Feb 7, 2026Updated 3 weeks ago
- AI-powered ffuf wrapper☆646Dec 4, 2025Updated 3 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,302Feb 25, 2026Updated last week
- ☆620Feb 5, 2026Updated last month
- The Network Execution Tool☆5,296Updated this week
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,263Dec 9, 2025Updated 2 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,773May 22, 2024Updated last year
- ☆94Jan 16, 2025Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆169Jun 29, 2025Updated 8 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆733Mar 21, 2024Updated last year
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆214Jan 12, 2026Updated last month
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Feb 18, 2026Updated 2 weeks ago
- Automate Recon XSS Bug Bounty☆178Updated this week
- Abuse trust-boundaries to bypass firewalls and network controls☆390Jul 24, 2025Updated 7 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆902Feb 23, 2026Updated last week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,925Oct 4, 2025Updated 5 months ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,519Updated this week
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated 2 weeks ago
- Detect common NFS server misconfigurations☆98Feb 4, 2026Updated last month
- 60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒☆1,210Updated this week
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆937Aug 24, 2023Updated 2 years ago
- Recon scripts for Red Team and Web blackbox auditing☆26Feb 20, 2026Updated last week
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 2 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆238Feb 11, 2025Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆729Jan 25, 2026Updated last month
- Generate and Manage KeyCredentialLinks☆248Jan 30, 2026Updated last month
- Hidden parameters discovery suite☆2,027Sep 8, 2024Updated last year
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,098Updated this week
- declutters url lists for crawling/pentesting☆1,531Feb 23, 2025Updated last year
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆358Jan 8, 2026Updated last month