EdOverflow / hunter
Guidelines for writing secure code for Python developers.
☆20Updated 7 years ago
Alternatives and similar repositories for hunter:
Users that are interested in hunter are comparing it to the libraries listed below
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 5 years ago
- ☆11Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- A static website template for security pages.☆50Updated 7 months ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- ☆33Updated 2 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Standardizing Security Titles☆13Updated 2 years ago
- Simple scripts aiding penetration testing process☆13Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Shodan Port Scanner☆42Updated 4 years ago
- ☆18Updated last year
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- DPE - Default Password Enumeration☆34Updated 11 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago