Esc4iCEscEsc / skanuvaty
Dangerously fast DNS/network/port scanner
☆897Updated 3 years ago
Alternatives and similar repositories for skanuvaty:
Users that are interested in skanuvaty are comparing it to the libraries listed below
- bypass-url-parser☆1,063Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,389Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆863Updated last year
- Real-world infosec wordlists, updated regularly☆1,471Updated this week
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆528Updated last year
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆399Updated 3 months ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆946Updated 3 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,550Updated 3 weeks ago
- Awesome cloud enumerator☆991Updated 3 weeks ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,527Updated last year
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆880Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.☆1,352Updated 2 months ago
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and…☆783Updated last year
- Payload Arsenal for Pentration Tester and Bug Bounty Hunters☆898Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,535Updated 3 weeks ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆898Updated last year
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,364Updated this week
- ☆749Updated 9 months ago
- Tool to bypass 403/40X response codes.☆1,222Updated 3 months ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆402Updated 2 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,747Updated 9 months ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆847Updated 9 months ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆1,843Updated 4 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,025Updated 4 months ago
- ☆718Updated 3 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆384Updated 3 years ago
- Subdomain and target enumeration tool built for offensive security testing☆859Updated 9 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,942Updated 3 weeks ago
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆940Updated 8 months ago
- Identify privilege escalation paths within and across different clouds☆685Updated 4 months ago