A fast WordPress plugin enumeration tool
☆816Apr 1, 2026Updated last week
Alternatives and similar repositories for wpprobe
Users that are interested in wpprobe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆839Mar 24, 2026Updated 3 weeks ago
- Header Exploitation HTTP☆730Apr 3, 2026Updated last week
- ☆777May 7, 2025Updated 11 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆388Nov 26, 2024Updated last year
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆312Mar 31, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- wpfinger is a red-team WordPress scanning tool☆120May 16, 2023Updated 2 years ago
- Discover new target domains using Content Security Policy☆512Mar 24, 2026Updated 3 weeks ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- AI-powered ffuf wrapper☆711Dec 4, 2025Updated 4 months ago
- An IIS short filename enumeration tool☆1,139Nov 25, 2024Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,465Jul 14, 2025Updated 9 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,326Updated this week
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Automate Recon XSS Bug Bounty☆183Mar 9, 2026Updated last month
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,812May 22, 2024Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 9 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆900Updated this week
- The Network Execution Tool☆5,407Apr 6, 2026Updated last week
- ☆628Feb 5, 2026Updated 2 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆298Oct 5, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,275Dec 9, 2025Updated 4 months ago
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆939Aug 24, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ParamScan is a chrome extension for finding reflected parameters in a webpage.☆92Jan 11, 2025Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆156Nov 2, 2025Updated 5 months ago
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆54Mar 29, 2025Updated last year
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,965Oct 4, 2025Updated 6 months ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,578Mar 16, 2026Updated 3 weeks ago
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆732Mar 21, 2024Updated 2 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Abuse trust-boundaries to bypass firewalls and network controls☆413Jul 24, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆215Jan 12, 2026Updated 3 months ago
- declutters url lists for crawling/pentesting☆1,544Feb 23, 2025Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆746Jan 25, 2026Updated 2 months ago
- ☆95Apr 7, 2026Updated last week
- psexecsvc - a python implementation of PSExec's native service implementation☆298Mar 24, 2026Updated 3 weeks ago
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆345Mar 21, 2026Updated 3 weeks ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago