LiterallyEthical / r3conwhal3
r3conwhale aims to develop a multifunctional recon chain for web applications, intelligently interpreting collected data, and optimizing performance and resource consumption through a concurrency-based approach.
☆12Updated 9 months ago
Alternatives and similar repositories for r3conwhal3:
Users that are interested in r3conwhal3 are comparing it to the libraries listed below
- An another JWT cracker but really fast!☆11Updated 2 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆16Updated 2 years ago
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Updated last year
- A powerful tool designed for identifying hidden endpoints and sensitive information within JavaScript files on a website.☆22Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆31Updated last year
- Quick tool to create custom wordlists like how fuzzers work☆11Updated last year
- Bxss Sniper: A web application penetration testing tool for Blind XSS detection☆19Updated last year
- A CLI utility to scan S3 buckets permissions☆11Updated last year
- ☆21Updated 4 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 7 months ago
- This repository contains the best fuzzing wordlist files☆29Updated 4 months ago
- Khonsu is a powerful port scanning tool written in python that detect open ports with concurrent and accurately☆16Updated last year
- ☆13Updated last year
- Xss payload for bypassing waf☆15Updated 4 years ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆14Updated 11 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- A very fast hostparser.☆9Updated last year
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆24Updated 3 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated 9 months ago
- Speed-up your hunting with google dorks🚀🚀☆22Updated 2 years ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆34Updated 4 months ago
- ☆19Updated 9 months ago
- offy is a tool for bugbounty hunters to save money in their EC2 instances☆13Updated last year
- This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for W…☆13Updated 11 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆39Updated 2 months ago
- Related subdomains finder☆29Updated 2 years ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆24Updated last year
- Get list of subsidiaries for a selected company☆27Updated 3 months ago
- Custom nuclei templates for bug hunting.....☆25Updated 10 months ago
- This includes all the templates of nuclei collected from different sources☆17Updated 2 years ago