D3vil0p3r / catanaLinks
CATANA - CUT your Wordlist!
☆14Updated 3 years ago
Alternatives and similar repositories for catana
Users that are interested in catana are comparing it to the libraries listed below
Sorting:
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆68Updated 4 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 4 years ago
- ☆37Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Creates and sends fake meeting invite☆71Updated 4 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- ☆29Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 9 months ago
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Updated 4 years ago
- Target practice for ffuf☆69Updated 4 years ago
- ☆43Updated 6 months ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆63Updated 3 years ago
- ☆56Updated 3 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago