Cillian-Collins / Recon
The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration files, open directories and other potentially harmful files can be found using this scanning tool. Use with permission of website administrators.
☆15Updated 7 years ago
Alternatives and similar repositories for Recon:
Users that are interested in Recon are comparing it to the libraries listed below
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Alpha version code of Recon UI☆14Updated 7 years ago
- Simple webinterface combining different recon tools.☆12Updated 7 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- ☆20Updated 5 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Scan and import relevant requests directly to burp!☆9Updated 5 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆21Updated 4 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆15Updated 4 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Updated 5 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- PHP tool to test XSS☆22Updated 5 years ago
- burp extender for fuzzing☆10Updated 6 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆19Updated 6 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆27Updated 6 years ago
- Journey to conquer the OSCP!☆13Updated 6 years ago
- So many shells in so little time☆10Updated 5 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆24Updated 8 years ago
- View screenshots as a slideshow over http☆15Updated 5 years ago
- URL-encode data streams via commandline☆14Updated 5 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Updated 6 years ago
- A multi-processed, multi-threaded scanner to discover web directories on multiple URLs.☆21Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago