M4cs / BabySploitLinks
BabySploit Beginner Pentesting Toolkit/Framework Written in Python
☆1,043Updated 6 years ago
Alternatives and similar repositories for BabySploit
Users that are interested in BabySploit are comparing it to the libraries listed below
Sorting:
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,495Updated 7 months ago
- Striker is an offensive information and vulnerability scanner.☆2,312Updated 2 years ago
- Hacking Toolkit☆967Updated 3 weeks ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,746Updated last month
- The Offensive Manual Web Application Penetration Testing Framework.☆1,848Updated 2 years ago
- HackBox is a powerful and comprehensive tool that combines a variety of techniques for web application and network security assessments, …☆412Updated 2 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,297Updated 7 years ago
- Reconnaissance Swiss Army Knife☆1,993Updated 5 years ago
- pentest framework☆1,239Updated 6 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆635Updated last month
- swiss army knife for hackers☆542Updated 2 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,815Updated last year
- Find exploits in local and online databases instantly☆1,803Updated 4 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,739Updated last year
- wide range mass audit toolkit☆1,033Updated 7 years ago
- Build interactive map of cameras from Shodan☆1,264Updated 5 years ago
- The most complete open-source tool for Twitter intelligence analysis☆1,961Updated 6 years ago
- Intelligent login bruteforcer.☆903Updated 2 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆794Updated 5 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆692Updated 5 years ago
- Know the dangers of credential reuse attacks.☆2,085Updated last month
- online port scan scraper☆1,119Updated 2 years ago
- TotalRecon installs all the recon tools you need☆465Updated 5 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,791Updated this week
- Advanced reconnaissance utility☆988Updated 2 years ago
- The hackers tool belt☆520Updated 7 years ago
- The New Hacking Framework☆705Updated 4 years ago
- Mass scan IPs for vulnerable services☆1,045Updated 3 years ago
- Find open databases - Powered by Binaryedge.io☆1,413Updated 5 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆650Updated 3 years ago