Programs I Made while learning python for pentesters.
☆20Aug 26, 2022Updated 3 years ago
Alternatives and similar repositories for Python_For_Pentester
Users that are interested in Python_For_Pentester are comparing it to the libraries listed below
Sorting:
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- [+]An Automation Tool Based on [ securitytrails.com ]☆17Jun 3, 2021Updated 4 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 8 months ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 5 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Dec 6, 2024Updated last year
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- ☆13Sep 28, 2024Updated last year
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated 11 months ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆11Mar 2, 2020Updated 6 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- black Ip lists, dorks-collection☆17Mar 1, 2026Updated 2 weeks ago
- Learning Data Structure and Algorithm By Doing☆19Sep 27, 2025Updated 5 months ago
- Bash script to extract data from the Waybackmachine☆11Mar 15, 2021Updated 5 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- ☆18Jan 8, 2025Updated last year
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- A Payload Injector for bugbounties written in go☆70Jul 18, 2020Updated 5 years ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- A Tool to find subdomains from hackerone reports.☆17Jun 23, 2021Updated 4 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75May 23, 2020Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated 11 months ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 8 months ago
- Turns a list of URLs into hostnames.☆16Feb 9, 2026Updated last month