wpfinger is a red-team WordPress scanning tool
☆118May 16, 2023Updated 2 years ago
Alternatives and similar repositories for wpfinger
Users that are interested in wpfinger are comparing it to the libraries listed below
Sorting:
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- A tool for monitoring bug bounty programs across multiple platforms to track scope changes.☆32Feb 17, 2026Updated 2 weeks ago
- A fast WordPress plugin enumeration tool☆783Feb 17, 2026Updated 2 weeks ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- gh0str3con is a All in one cloud based web Recon tool.☆23Jul 8, 2024Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆25Dec 24, 2025Updated 2 months ago
- Bash script to extract data from the Waybackmachine☆11Mar 15, 2021Updated 4 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- A collection of famous recon public scripts, but in bash <3☆29Mar 2, 2021Updated 5 years ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Jun 29, 2025Updated 8 months ago
- Javascript file change monitoring☆17Nov 11, 2025Updated 3 months ago
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆232Feb 2, 2026Updated last month
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆116Feb 23, 2026Updated last week
- 60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒☆1,210Updated this week
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Dec 12, 2022Updated 3 years ago
- ☆29Oct 15, 2023Updated 2 years ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆733Mar 21, 2024Updated last year
- Web cache poisoning vulnerability scanner.☆73May 5, 2022Updated 3 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Oct 2, 2023Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆116Jul 18, 2023Updated 2 years ago
- Private vulnerability testing suite☆13Mar 30, 2021Updated 4 years ago
- A python script to scan for Apache Tomcat server vulnerabilities.☆887Jan 12, 2026Updated last month
- ☆79Mar 26, 2024Updated last year
- A path-normalization pentesting tool.☆151Jan 22, 2026Updated last month
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆219Jul 14, 2024Updated last year
- Fast and customizable subdomain wordlist generator using DSL☆928Feb 5, 2026Updated last month
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆311Mar 31, 2024Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆143Sep 16, 2024Updated last year
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆888May 3, 2023Updated 2 years ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆176Jul 6, 2024Updated last year
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆576Sep 25, 2025Updated 5 months ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆30Jul 11, 2025Updated 7 months ago
- Injects shellcode into remote processes using direct syscalls☆77Dec 30, 2020Updated 5 years ago