D3vil0p3r / catana
CATANA - CUT your Wordlist!
☆13Updated 2 years ago
Alternatives and similar repositories for catana:
Users that are interested in catana are comparing it to the libraries listed below
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 3 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- Just another vulnerable web application.☆35Updated 5 months ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 2 years ago
- Breaking Active Directory Security with 🍞☆31Updated 2 months ago
- Classic Web shell upload techniques & Web RCE techniques☆24Updated 2 months ago
- Automated HTTP Request Repeating With Burp Suite☆35Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆24Updated 2 weeks ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆27Updated 2 years ago
- web application pentesting tools for docker☆17Updated 2 years ago
- Pentesting notes☆17Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆35Updated 2 years ago
- ☆34Updated last year
- Enumeration & fingerprint tool☆24Updated 10 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆34Updated last year
- Pentest stuff☆49Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- ☆28Updated last year
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆11Updated last year
- Tools used for Pentesting☆22Updated last year
- Checks if files is accessible based on the source code.☆16Updated 10 months ago