Josue87 / pwndbTorCredentials
☆30Updated 4 years ago
Alternatives and similar repositories for pwndbTorCredentials:
Users that are interested in pwndbTorCredentials are comparing it to the libraries listed below
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆35Updated 5 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Updated 2 years ago
- XSSRecon - Reflected XSS Scanner☆23Updated 4 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆12Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Repository of tools used in my blog☆50Updated 10 months ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆11Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- A simple script to check for insecurely exposed git repositories.☆12Updated 5 years ago
- ☆34Updated last week
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆37Updated 5 years ago
- Unofficial WhatCMS API package☆42Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Another vulnerability scanner☆17Updated last year
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆17Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆11Updated 5 years ago
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Automate email search in HaveIBeenPwned☆10Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 7 months ago
- ☆13Updated 7 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆10Updated last year