EdOverflow / hunter
Guidelines for writing secure code for Python developers.
☆20Updated 7 years ago
Alternatives and similar repositories for hunter:
Users that are interested in hunter are comparing it to the libraries listed below
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- A static website template for security pages.☆50Updated 6 months ago
- A list of universities with vulnerability disclosure policies☆12Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Learn the basics of cryptography throughout history.☆19Updated 4 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Simple scripts aiding penetration testing process☆12Updated 5 years ago
- ☆17Updated last year
- ☆34Updated last month
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Shodan Port Scanner☆42Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆36Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- An MSF plugin to send notifications to Slack when shells are created or killed☆14Updated 8 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- Synack Red Team Firewall Script☆10Updated 9 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- ☆28Updated 5 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago